Are Information Security Practices Driven by the Likelihood and potential Impact of Security Events?
Gunjan BatraKhawaja SaeedHumayun ZafarPublished in: AMCIS (2023)
Keyphrases
- information security
- potential impact
- security issues
- information assurance
- countermeasures
- security requirements
- information systems
- intrusion detection
- security level
- network security
- computer security
- management practices
- smart card
- cyber defense
- maximum likelihood
- information security management
- sensitive data
- case study
- security risks
- security mechanisms
- technical issues
- critical infrastructure
- risk analysis
- risk assessment
- iso iec
- user authentication
- data security
- smart grid
- database
- data mining techniques
- databases