Information security investment for competitive firms with hacker behavior and security requirements.
Xing GaoWeijun ZhongPublished in: Ann. Oper. Res. (2015)
Keyphrases
- information security
- security requirements
- network security
- information systems
- smart card
- countermeasures
- security analysis
- security properties
- security issues
- intrusion detection
- security mechanisms
- information security management
- smart grid
- information assurance
- information technology
- iso iec
- cyber defense
- security policies
- real world
- data security
- access control
- e government
- databases
- security protocols
- sensitive data
- privacy concerns