Why security and privacy research lies at the centre of the information systems (IS) artefact: proposing a bold research agenda.
Paul Benjamin LowryTamara DinevRobert WillisonPublished in: Eur. J. Inf. Syst. (2017)
Keyphrases
- information systems
- security issues
- information security
- statistical databases
- security concerns
- information assurance
- data security
- security risks
- privacy concerns
- security and privacy issues
- security mechanisms
- rfid systems
- privacy preserving
- preserving privacy
- security properties
- sensitive data
- personal data
- security requirements
- confidential information
- security measures
- privacy requirements
- privacy issues
- security threats
- secure multiparty computation
- identity management
- access control
- electronic payment
- privacy enhancing
- protection mechanisms
- information processing systems
- individual privacy
- information technology
- authentication protocol
- security problems
- personal information
- data privacy
- security services
- network security
- cyber security
- rfid tags
- mutual authentication
- security management
- security analysis
- privacy preserving data mining
- biometric template
- security policies
- e government
- private information
- key management
- differential privacy
- privacy protection
- electronic transactions
- third party
- intrusion detection
- security protocols