comparative research could explore how institutional,
regulatory, and cultural differences shape governance
approaches. Extending this work across countries or
sectors could clarify whether observed patterns
reflect broader contingency factors or local
governance logic.
Thirdly, mixed-methods research could be used to
augment these findings by quantitatively measuring
governance structures, perceptions of leadership, and
CISO–board relationships. It would then be possible
to examine whether certain communication,
influence, and budgeting arrangements are more
related to perceived governance effectiveness.
Fourthly, feedback from the board members would
give a fuller picture of relational governance.
Exploration of how board members view their roles
might reveal gaps or misalignments and create
momentum for additional research on mutual
influence in ISG.
Finally, future research should account for new
technological and regulatory contingencies. AI-
driven threats, zero-trust architectures, and evolving
frameworks such as NIS2 will further complicate
governance and require adaptive strategies. Future
studies must also evaluate whether current practices
remain valid in light of digital transformation and AI-
based platforms.
REFERENCES
Alenazy, S. M., Alenazy, R. M., & Ishaque, M. (2023).
Governance of information security and its role in
reducing the risk of electronic accounting information
system. 2023 1st International Conference on
Advanced Innovations in Smart Cities (ICAISC),
Alenezi, A. (2024). Cybersecurity risks and strategies in
learning services of Higher Education Institutions
(HEIs) in developing and emerging countries–a critical
scoping review. ﺔﻠﺠﻤﻟﺍ ﺔﻳﺮﺼﻤﻟﺍ ﺕﺎﺳﺍﺭﺪﻠﻟ ﺔﻳﺭﺎﺠﺘﻟﺍ, 48(3),
480-506.
Amine, A. M., Chakir, E. M., Issam, T., & Khamlichi, Y. I.
(2023). A Review of Cybersecurity Management
Standards Applied in Higher Education Institutions.
International Journal of Safety & Security Engineering,
13(6).
Armstrong, C. P., & Sambamurthy, V. (1999). Information
technology assimilation in firms: The influence of
senior leadership and IT infrastructures. Information
systems research, 10(4), 304-327.
Ashenden, D., & Sasse, A. (2013). CISOs and
organisational culture: their own worst enemy?
Computers & Security, 39, 396-405.
Bobbert, Y., & Mulder, H. B. F. (2015). Governance
Practices and Critical Success Factors Suitable for
Business Information Security. 2015 International
Conference on Computational Intelligence and
Communication Networks (CICN), 1097-1104.
Braun, V., & Clarke, V. (2006). Using thematic analysis in
psychology. Qualitative research in psychology, 3(2),
77-101.
Caluwe, L., & De Haes, S. (2019). Board Level IT
Governance: A scoping review to set the research
agenda. Information Systems Management, 36(3), 262-
283.
Cheng, E. C., & Wang, T. (2022). Institutional strategies for
cybersecurity in higher education institutions.
Information, 13(4), 192.
Ciekanowski, M., Żurawski, S., Ciekanowski, Z.,
Pauliuchuk, Y., & Czech, A. (2024). Chief information
security officer: A vital component of organizational
information security management. European Research
Studies, 27(2), 35-46.
Coertze, J., & Von Solms, R. (2014). The board and CIO:
The IT alignment challenge. 2014 47th Hawaii
International Conference on System Sciences,
Ferguson, D. D. S. (2023). The outcome efficacy of the
entity risk management requirements of the NIS 2
Directive. International Cybersecurity Law Review,
4(4), 371-386.
Gale, M., Bongiovanni, I., & Slapnicar, S. (2022).
Governing cybersecurity from the boardroom:
challenges, drivers, and ways ahead. Computers &
Security, 121, 102840.
Ghafar, Z. N. (2024). The evaluation research: A
comparative analysis of qualitative and quantitative
research methods. Journal of Language, Literature,
Social and Cultural Studies, 2(1), 1-10.
Ginsberg, A., & Venkatraman, N. (1985). Contingency
perspectives of organizational strategy: A critical
review of the empirical research. Academy of
Management review, 10(3), 421-434.
Goodyear, M., Goerdel, H., Portillo, S., & Williams, L.
(2010). Cybersecurity management in the states: The
emerging role of chief information security officers.
Available at SSRN 2187412.
Hanson, E. M. (1979). School management and
contingency theory: An emerging perspective.
Educational Administration Quarterly, 15(2), 98-116.
Hartmann, C., & Carmenate, J. (2021). Academic Research
on the Role of Corporate Governance and IT Expertise
in Addressing Cybersecurity Breaches: Implications for
Practice, Policy and Research. Current Issues in
Auditing.
Hung, H. (1998). A typology of the theories of the roles of
governing boards. Corporate governance, 6(2), 101-
111.
Jewer, J., & McKay, K. N. (2012). Antecedents and
consequences of board IT governance: Institutional and
strategic choice perspectives. Journal of the Association
for Information Systems, 13(7), 1.
Karanja, E., & Rosso, M. A. (2017). The chief information
security officer: An exploratory study. Journal of
International Technology and Information
Management, 26(2), 23-47.