Login / Signup
Empowerment and BYOx: Towards Improved IS Security Compliance.
Maximilian v. Welck
Manuel Trenz
Tina Blegind Jensen
Daniel Veit
Published in:
ICIS (2017)
Keyphrases
</>
security issues
security requirements
information security
network security
intrusion detection
access control
security policies
security mechanisms
information assurance
real time
low cost
statistical databases
security model
security level
security problems