Whither information security? Examining the complementarities and substitutive effects among IT and information security firms.
Lara KhansaDivakaran LiginlalPublished in: Int. J. Inf. Manag. (2012)
Keyphrases
- information security
- information systems
- countermeasures
- security issues
- smart card
- computer security
- intrusion detection
- information security management
- security requirements
- information assurance
- security level
- risk assessment
- cyber defense
- smart grid
- network security
- iso iec
- information technology
- database
- sensitive data
- user authentication
- privacy concerns
- security risks
- case study
- decision making
- risk analysis
- e learning
- text classification
- design theory
- dimensionality reduction
- e government