Evaluating the effectiveness of learner controlled information security training.
Sherly AbrahamInduShobha N. Chengalur-SmithPublished in: Comput. Secur. (2019)
Keyphrases
- information security
- countermeasures
- security issues
- smart card
- information security management
- network security
- information systems
- intrusion detection
- computer security
- cyber defense
- information assurance
- security requirements
- user authentication
- smart grid
- sensitive data
- training set
- risk assessment
- security risks
- learning process
- e learning
- risk analysis
- iso iec
- security level