Identity and Access Management: Business Performance Through Connected Intelligence, 2014. ,
Identity management:concepts, technologies, and systems, 2011. ,
, Contemporary Identity and Access Management Architectures: Emerging Research and Opportunities, vol.13, p.9781522548287, 2018.
Enterprise Risk Management: Establishing Effective Governance, Risk, and Compliance, Second Edition, 2011. ,
Designing an IAM Framework with Oracle Identity and Access Management Suite, 2010. ,
An Enterprise Security Program and Architecture to Support Business Drivers, Technology Innovation Management Review, vol.3, issue.8, 2013. ,
The cyber security threat stops in the boardroom, Journal of business continuity & emergency planning, vol.7, issue.2, pp.138-148, 2014. ,
Theorizing the concept and role of assurance in information systems security, Information & management, vol.50, issue.7, pp.598-605, 2013. ,
A Confusing Array of Identity Management Pressures and Initiatives. What Drives Identity Management Requirements?, 2006. ,
Digital Identity and Access Management: Technologies and Frameworks, 2012. ,
Information Security Management Handbook, Sixth Edition, vol.1, 2007. ,
Towards a generic Identity and Access Assurance model by component analysis-A conceptual review, Enterprise Systems Conference (ES), pp.1-11, 2013. ,
Sarbanes-Oxley Act of, The Public Company Accounting Reform and Investor Protection, 2002. ,
Business Security Architecture: Weaving Information Security into Your Organization's Enterprise Architecture through SABSA®. Information Security Journal: A Global Perspective, vol.21, pp.47-54, 2012. ,
IT governance: A manager's guide to data security and ISO 27001/ISO 27002, 2008. ,
Identity Management Architecture: a new direction, 8th IEEE International Conference on Computer and Information Technology, pp.408-413, 2008. ,
Generic and Complete Three-Level Identity Management Model, Proceedings of 2nd International Conference on Emerging Security Information, Systems and Technologies, pp.232-237, 2008. ,
Introducing the IBM Security Framework and IBM Security, 2011. ,
, Oracle SOA Suite 11g Handbook, 2011.
Creating a Balanced Scorecard for Computer Security, IEEE Information Assurance Workshop, pp.15-18, 2006. ,
Quantitative Techniques in Management, 2014. ,