Mapping Information Security Standards: A Counter-Terrorism Example.
Gail RidleyJacky HartnettWilumpa Jarern-ImakulPublished in: ECIS (2008)
Keyphrases
- information security
- counter terrorism
- iso iec
- countermeasures
- security issues
- law enforcement
- network security
- homeland security
- government services
- information systems
- intrusion detection
- smart card
- information sharing
- information security management
- e government
- security level
- cyber defense
- risk analysis
- information assurance
- smart grid
- intelligence analysis
- web services
- risk assessment
- critical infrastructure
- fraud detection
- decision support
- decision support system
- data sources
- active learning
- metadata
- databases