Identifying Information Systems Security Requirements for Different Organizational Forms: A transactions cost approach.
Gurvirender TejayPublished in: AMCIS (2006)
Keyphrases
- security requirements
- information systems
- information security
- concurrency control protocols
- information technology
- timing constraints
- security properties
- smart card
- security analysis
- requirements engineering
- information security management
- access control
- security policies
- security concerns
- security problems
- security model
- security mechanisms
- mobile commerce
- systems development
- real time databases
- database
- security issues
- transaction management
- software architecture
- knowledge management
- secure electronic
- reference models
- security protocols
- distributed database systems
- cost sensitive
- network security
- computer systems
- security patterns
- covert channel
- databases
- execution model
- project management
- source code
- artificial intelligence
- development lifecycle