Managing partial outsourcing on information security in the presence of security externality.
Yong WuYihao LiuTao DaiDong ChengPublished in: Expert Syst. Appl. (2024)
Keyphrases
- information security
- information systems
- security issues
- information assurance
- countermeasures
- security level
- security requirements
- intrusion detection
- computer security
- network security
- smart card
- information security management
- information technology
- risk assessment
- sensitive data
- e government
- service providers
- user authentication
- cyber defense
- risk analysis
- smart grid
- privacy concerns
- security risks
- business processes
- data management
- case study