On the Singularity of Valuating IT Security Investments.
Thomas NeubauerChristian HartlPublished in: ACIS-ICIS (2009)
Keyphrases
- information technology
- information security
- intrusion detection
- network security
- security policies
- statistical databases
- security threats
- access control
- security issues
- information assurance
- computer security
- information systems
- security vulnerabilities
- cyber attacks
- security systems
- data security
- security mechanisms
- data mining
- key management
- security requirements
- risk management
- privacy preserving
- security level
- malware detection
- security problems
- scale space
- security management
- high security
- sensor networks