Hackers, Users, Information Security.
Ivan P. L. PngCandy Q. TangQiu-Hong WangPublished in: WEIS (2006)
Keyphrases
- information security
- network security
- countermeasures
- security issues
- security risks
- computer security
- privacy concerns
- information systems
- intrusion detection
- information security management
- smart card
- risk assessment
- security level
- security requirements
- real world
- iso iec
- e government
- database
- data security
- technical issues
- case study
- information assurance
- sensitive data
- personal data
- active learning
- user authentication
- recommender systems
- management practices