Adopting security routines in legacy organizations.
Ernani AzevedoMarcos MachadoRodrigo MeloRafael AschoffDjamel SadokUbiratan do CarmoPublished in: LANCOMM@SIGCOMM (2016)
Keyphrases
- security breaches
- network security
- information security
- information security management
- counter terrorism
- intrusion detection
- security requirements
- information technology
- legacy systems
- statistical databases
- information systems
- security threats
- service management
- mission critical
- decision making
- access control
- organizational learning
- security systems
- situational awareness
- security issues
- security policies
- enterprise wide
- security level
- security problems
- data mining
- knowledge management
- business applications
- business environment
- security analysis
- service delivery
- security mechanisms