Neutralization Tendencies in Information Systems Security Violation.
Frank KingSouren PaulPublished in: HICSS (2024)
Keyphrases
- information systems
- information security
- information assurance
- network security
- intrusion detection
- information processing systems
- security issues
- access control
- security requirements
- computer security
- security problems
- security threats
- countermeasures
- software engineering
- data security
- security level
- statistical databases
- security policies
- information technology
- rfid tags
- security analysis
- health care
- user authentication
- constraint violations
- data mining
- design science
- cyber security
- functional requirements
- project management
- operating system
- knowledge management