Security subcultures in an organization - exploring value conflicts.
Ella KolkowskaPublished in: ECIS (2011)
Keyphrases
- information security management
- information security
- security requirements
- intrusion detection
- security threats
- network security
- information assurance
- key management
- access control
- conflict resolution
- security policies
- statistical databases
- security systems
- cooperative
- information processing
- security level
- information systems
- database
- software development
- sensitive data
- functional requirements
- data integrity
- case study
- security properties
- security problems
- neural network
- data sets