Information Security Assurance and the Role of Security Configuration Management from Substantive and Symbolic Perspectives.
Chia-Ming SunYen-Yao WangChen-Bin YangPublished in: AMCIS (2020)
Keyphrases
- information security
- configuration management
- security issues
- information assurance
- security level
- network security
- countermeasures
- security requirements
- intrusion detection
- computer security
- information systems
- smart card
- information security management
- risk assessment
- smart grid
- network management
- security risks
- user authentication
- cyber defense
- risk analysis
- sensitive data
- data security
- e government
- databases
- security threats
- security mechanisms
- privacy concerns
- intrusion detection system
- source code
- software engineering
- semi supervised