Exploring the Antecedents of Shadow Information Security Practices.
Duy Dang-PhamNik ThompsonAtif AhmadSean B. MaynardPublished in: ACIS (2023)
Keyphrases
- information security
- management practices
- countermeasures
- security issues
- information systems
- intrusion detection
- smart grid
- smart card
- information security management
- e government
- network security
- computer security
- information assurance
- security requirements
- risk assessment
- case study
- privacy concerns
- security level
- sensitive data
- data security
- cyber defense
- iso iec
- risk analysis
- security risks
- light source
- data protection
- data mining
- real world