Identifying Traits and Values of Top-Performing Information Security Personnel.
Jordan ShropshireArt GowanPublished in: J. Comput. Inf. Syst. (2017)
Keyphrases
- information security
- information systems
- countermeasures
- security issues
- information security management
- intrusion detection
- smart card
- computer security
- security requirements
- management practices
- cyber defense
- security level
- iso iec
- data security
- smart grid
- network security
- risk assessment
- risk analysis
- data processing
- security risks
- information assurance
- sensitive data
- e government
- design theory
- privacy concerns
- communication networks
- knowledge discovery
- information technology
- object recognition
- real world