A Call to IS Educators to Respond to the Voices of Women in Information Security.
Amy B. WoszczynskiSherri ShadePublished in: J. Inf. Syst. Educ. (2010)
Keyphrases
- information security
- countermeasures
- security issues
- information systems
- smart card
- intrusion detection
- network security
- information security management
- computer security
- security level
- information technology
- security requirements
- cyber defense
- information assurance
- security risks
- sensitive data
- risk assessment
- smart grid
- e learning
- privacy concerns
- risk analysis
- database
- e government
- data security
- critical infrastructure
- case study
- computer systems