Risk Homeostasis in Information Security: Challenges in Confirming Existence and Verifying Impact.
Karen RenaudMerrill WarkentinPublished in: NSPW (2017)
Keyphrases
- information security
- risk assessment
- security issues
- risk analysis
- countermeasures
- information systems
- network security
- intrusion detection
- technical issues
- security risks
- computer security
- lessons learned
- security level
- smart card
- cyber defense
- information assurance
- smart grid
- security requirements
- privacy concerns
- risk factors
- real world
- information security management
- risk management
- case study
- information technology
- data protection
- design principles