Outsourcing Strategies for Information Security: Correlated Losses and Security Externalities.
Chenglong ZhangNan FengJianjian ChenDahui LiMinqiang LiPublished in: Inf. Syst. Frontiers (2021)
Keyphrases
- information security
- information systems
- security issues
- information assurance
- countermeasures
- security requirements
- computer security
- intrusion detection
- smart card
- security level
- network security
- information security management
- cyber defense
- risk assessment
- smart grid
- information technology
- sensitive data
- user authentication
- risk analysis
- technical issues
- security mechanisms
- iso iec
- security threats
- data protection
- security risks
- service providers
- database