Routine, Situational, and Exceptional Security Violations in Organizations.
Clay PoseyMitchell McCoardA. J. BurnsTom L. RobertsPublished in: AMCIS (2024)
Keyphrases
- security breaches
- information security management
- information technology
- security issues
- information security
- network security
- access control
- intrusion detection
- information systems
- security policies
- situational awareness
- security threats
- service management
- security systems
- counter terrorism
- functional requirements
- computer security
- cyber security
- network management
- statistical databases
- cyber attacks
- security level
- security problems
- data management
- security mechanisms
- security measures
- cyber crime
- mission critical
- organizational learning
- mobile agents
- knowledge management
- decision making