Information Security: User Precautions, Attacker Efforts, and Enforcement.
Ivan P. L. PngQiu-Hong WangPublished in: HICSS (2009)
Keyphrases
- information security
- user authentication
- information systems
- countermeasures
- security issues
- information security management
- intrusion detection
- network security
- security requirements
- computer security
- smart card
- security risks
- security level
- cyber defense
- database
- iso iec
- smart grid
- risk analysis
- privacy concerns
- e government
- risk assessment
- data mining techniques
- real world