Information security risk assessments following cybersecurity breaches: The mediating role of top management attention to cybersecurity.
Faheem Ahmed ShaikhMikko T. SiponenPublished in: Comput. Secur. (2023)
Keyphrases
- information security
- countermeasures
- security issues
- smart card
- network security
- computer security
- intrusion detection
- information systems
- security requirements
- e government
- risk assessment
- security level
- information security management
- risk analysis
- information assurance
- smart grid
- cyber defense
- security risks
- iso iec
- design theory
- sensitive data
- anomaly detection
- real world
- databases