Reaction of users as potential victims of information security breach.
Suparak JanjarasjitSiew H. ChanPublished in: Inf. Comput. Secur. (2021)
Keyphrases
- information security
- security risks
- sensitive data
- countermeasures
- security issues
- information systems
- intrusion detection
- smart card
- network security
- information assurance
- information security management
- security requirements
- iso iec
- privacy concerns
- risk assessment
- risk analysis
- smart grid
- personal data
- critical infrastructure
- data mining
- metadata
- cyber defense