Information Security Strategies for Information-Sharing Firms Considering a Strategic Hacker.
Yong WuMengyao XuDong ChengTao DaiPublished in: Decis. Anal. (2022)
Keyphrases
- information sharing
- information security
- network security
- e government
- information systems
- countermeasures
- information exchange
- share information
- intrusion detection
- security issues
- smart card
- public sector
- data sharing
- security level
- emergency response
- cyber defense
- information security management
- risk assessment
- information assurance
- knowledge sharing
- smart grid
- security requirements
- information technology
- senior management
- knowledge management
- organizational change
- secure information sharing
- disaster management
- public safety
- databases
- government agencies
- case study
- intelligence and security informatics
- counter terrorism
- social awareness
- inter organizational
- risk analysis
- law enforcement
- anomaly detection