Paradoxical tensions in the implementation of digital security governance: Toward an ambidextrous approach to governing digital security.
Stef SchinaglAbbas ShahimSvetlana KhapovaPublished in: Comput. Secur. (2022)
Keyphrases
- public key infrastructure
- network security
- security issues
- access control
- security mechanisms
- security management
- circuit design
- security systems
- key management
- security requirements
- security measures
- intrusion detection
- information assurance
- security threats
- encryption algorithms
- security problems
- information technology
- security policies
- digital content
- information security
- web services
- cyber security
- digital technologies
- security protocols
- data integrity
- security level
- security analysis
- functional requirements
- network management