Capturing industry experience for an effective information security assessment.
Shu-Chuan ChaoKuanchin ChenChien-Hua LinPublished in: Int. J. Inf. Syst. Chang. Manag. (2006)
Keyphrases
- information security
- risk assessment
- countermeasures
- security level
- information systems
- information security management
- network security
- computer security
- smart card
- intrusion detection
- security issues
- case study
- e government
- smart grid
- data security
- information assurance
- databases
- dimensionality reduction
- security requirements
- information technology
- metadata