A grounded theory approach to security policy elicitation.
Simon N. FoleyVivien M. RooneyPublished in: Inf. Comput. Secur. (2018)
Keyphrases
- grounded theory
- security policies
- access control
- security management
- network security
- lessons learned
- security concerns
- data mining and knowledge discovery
- distributed systems
- factors influencing
- network management
- security requirements
- unauthorized access
- database
- young children
- computer mediated communication
- ubiquitous computing environments
- information systems
- computer networks
- cooperative