Insight into hackers' reaction toward information security breach.
Siew H. ChanSuparak JanjarasjitPublished in: Int. J. Inf. Manag. (2019)
Keyphrases
- information security
- network security
- sensitive data
- countermeasures
- security issues
- intrusion detection
- smart card
- information systems
- risk assessment
- computer security
- information security management
- security requirements
- security level
- information assurance
- e government
- smart grid
- cyber defense
- iso iec
- critical infrastructure
- machine learning
- private information
- decision support system
- data security
- risk analysis
- security policies
- third party
- data sources
- management practices