Information Security Governance: Valuation of Dependencies Between IT Solution Architectures.
Oscar González RojasLina Ochoa-VenegasGuillermo Molina-LeónPublished in: BIR (2016)
Keyphrases
- databases
- information security
- information systems
- countermeasures
- e government
- computer security
- smart card
- security issues
- intrusion detection
- network security
- information security management
- information assurance
- security level
- risk assessment
- cyber defense
- data security
- senior management
- design theory
- sensitive data
- security requirements
- information retrieval
- real world