Managing Security Outsourcing in the Presence of Strategic Hackers.
Yong WuJunlin DuanTao DaiDong ChengPublished in: Decis. Anal. (2020)
Keyphrases
- network security
- information technology
- information security
- information systems
- information warfare
- security requirements
- intrusion detection
- access control
- security issues
- service providers
- security vulnerabilities
- cyber security
- statistical databases
- case study
- knowledge management
- security policies
- penetration testing
- security level
- service management
- network management
- decision making
- data security
- business process
- security measures
- security systems
- enterprise wide
- database
- win win
- database security
- authentication protocol
- intrusion detection system
- security analysis
- functional requirements