An approach to enhance the security of ICT infrastructure through legal, regulatory influences.
Charles N. TarimoLouise YngströmStewart KowalskiPublished in: ISSA (2005)
Keyphrases
- information and communication technologies
- ad hoc networking
- information security
- highly distributed
- security services
- intrusion detection
- security architecture
- security policies
- situational awareness
- security requirements
- key management
- information communication technology
- small and medium enterprises
- identity management
- enterprise systems
- case study
- security issues
- ubiquitous computing
- access control
- public key infrastructure
- legal knowledge
- network security
- information exchange
- st century
- statistical databases
- data protection
- cloud services
- developing countries
- computing environments
- legal reasoning
- south africa
- routing protocol
- electronic transactions
- higher education
- power grids