Information Security Assurance and the Role of Security Configuration Management: Substantive and Symbolic Perspectives.
Chia-Ming SunYen-Yao WangChen-Bin YangPublished in: J. Inf. Syst. (2022)
Keyphrases
- information security
- configuration management
- security issues
- countermeasures
- information assurance
- security requirements
- intrusion detection
- network security
- security level
- smart card
- information systems
- network management
- computer security
- information security management
- sensitive data
- smart grid
- version control
- cyber defense
- security risks
- senior management
- e government
- iso iec
- risk analysis
- risk assessment
- privacy concerns
- data processing
- dimensionality reduction
- semi supervised