To outsource or not: The impact of information leakage risk on information security strategy.
Nan FengYufan ChenHaiyang FengDahui LiMinqiang LiPublished in: Inf. Manag. (2020)
Keyphrases
- information security
- risk assessment
- risk analysis
- information leakage
- intrusion detection
- security issues
- smart card
- information security management
- information systems
- network security
- risk management
- information assurance
- security risks
- sensitive data
- security requirements
- cyber defense
- iso iec
- third party
- privacy concerns
- personal information
- social media
- decision making
- data mining
- databases