Development and validation of instruments of information security deviant behavior.
Amanda M. Y. ChuPatrick Y. K. ChauPublished in: Decis. Support Syst. (2014)
Keyphrases
- information security
- security issues
- countermeasures
- technical issues
- design theory
- smart card
- information systems
- computer security
- network security
- security requirements
- intrusion detection
- cyber defense
- information security management
- case study
- security level
- sensitive data
- risk assessment
- e government
- machine learning
- databases