Conceptualizing the Role of IS Security Compliance in Projects of Digital Transformation: Tensions and Shifts Between Prevention and Response Modes.
Hassan RazaJoao BaptistaPanos ConstantinidesPublished in: ICIS (2019)
Keyphrases
- role based access control
- security requirements
- information security
- software development
- security policies
- image scrambling
- public key infrastructure
- security issues
- access control
- security protocols
- security threats
- network security
- intrusion detection
- sensitive data
- computer security
- security analysis
- data security
- case study
- data mining