Theorising on risk homeostasis in the context of information security behaviour.
Wayne D. KearneyHennie A. KrugerPublished in: Inf. Comput. Secur. (2016)
Keyphrases
- information security
- risk assessment
- risk analysis
- security issues
- countermeasures
- information systems
- computer security
- information security management
- network security
- risk management
- intrusion detection
- smart card
- cyber defense
- security level
- sensitive data
- security risks
- information assurance
- e government
- security requirements
- low cost
- real world
- databases
- information retrieval
- iso iec
- design theory