Login / Signup
Risky Business: Assessing Security with External Measurements.
Benjamin Edwards
Jay Jacobs
Stephanie Forrest
Published in:
CoRR (2019)
Keyphrases
</>
data mining
service management
enterprise systems
business processes
intrusion detection
information security
decision making
electronic commerce
business process
security issues
access control
security problems
rfid technology
key management
security requirements
information systems
security policies
return on investment
data quality
business intelligence
security level
statistical databases
external information
computer security
business applications
network security
knowledge management
security analysis
service delivery
biometric systems
mission critical
real world
competitive advantage
trust relationships
business activities