Towards information security behavioural compliance.
Cheryl VroomRossouw von SolmsPublished in: Comput. Secur. (2004)
Keyphrases
- information security
- countermeasures
- data protection
- security issues
- information systems
- smart card
- intrusion detection
- computer security
- network security
- information security management
- security requirements
- smart grid
- security level
- information assurance
- design theory
- user authentication
- risk analysis
- iso iec
- technical issues
- privacy concerns
- risk assessment
- information technology
- security risks
- case study
- critical infrastructure
- data security
- sensitive data
- object recognition