Review Section 1.3 on effective versus ineffective security governance in Westby, J. R., and Allen, J. H. (2007), Governing for Enterprise Security (GES) Implementation Guide, which is located in your Module 3 readings (and available online from (Links to an external site.)).   Compare and contrast the effectiveness criteria in Table 1 on pp. 8-9 of Westby and Allen (2007) with Table 25.3 on pp. 287-288 of Hopkin (2014).  Be sure to identify any effectiveness criteria from Westby and Allen (2007) that you believe should be added to the criteria outlined in Hopkin (2014).