An explorative approach on the impact of external and organizational events on information security.
Ilirjana AjazajSebastian KurowskiPublished in: Open Identity Summit (2017)
Keyphrases
- information security
- information security management
- information systems
- countermeasures
- security issues
- smart card
- intrusion detection
- information technology
- computer security
- network security
- security requirements
- e government
- information assurance
- security level
- iso iec
- smart grid
- senior management
- cyber defense
- risk assessment
- individual level
- real world
- risk analysis
- security management
- probabilistic model
- databases
- decision making
- case study
- association rules
- technical issues
- critical infrastructure
- data security
- data warehouse
- knowledge management
- sensitive data
- risk management