Empowering Information Security Managers: Tailored Information Security Policy Design with POLCO Software.
Elham RostamiPublished in: ISD (2023)
Keyphrases
- information security
- information systems
- network security
- security requirements
- security level
- privacy concerns
- computer systems
- end users
- user interface
- countermeasures
- security policies
- security issues
- information technology
- technical issues
- software development
- semi supervised
- design process
- software architecture
- software projects
- case study
- databases