Managing Security in Organizations: Adoption of Information Security Solutions.
Tejaswini C. HerathHemantha S. B. HerathJohn D'ArcyPublished in: SIGMIS-CPR (2017)
Keyphrases
- information security
- information systems
- information security management
- security issues
- information technology
- countermeasures
- information assurance
- e government
- security requirements
- security level
- computer security
- network security
- intrusion detection
- smart card
- data security
- senior management
- cyber defense
- risk analysis
- smart grid
- design theory
- risk assessment
- enterprise wide
- technical issues
- critical infrastructure
- security mechanisms
- cyber attacks
- privacy concerns
- user authentication
- iso iec
- data protection
- security management
- security risks
- intrusion detection system