2014
DOI: 10.1007/s10660-014-9155-2
|View full text |Cite
|
Sign up to set email alerts
|

Public IT service strategy for social information security in the intelligence all-things environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2015
2015
2021
2021

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(1 citation statement)
references
References 21 publications
0
1
0
Order By: Relevance
“…Lee and Kim (2017) found that the reason for the continuous occurrence of personal information leakage is that the compensation for victims is insufficient and the cost borne by companies is low, which leads to the loss of reasons for enterprises to invest in information security, and thus results in a lower average level of personal information security. Yoo and Chang (2014) found that the disclosure and abuse of personal information privacy by internal personnel of Internet service providers was an essential reason for information disclosure, and the current research mainly focused on technical means, while the security research on management factors was ignored.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Lee and Kim (2017) found that the reason for the continuous occurrence of personal information leakage is that the compensation for victims is insufficient and the cost borne by companies is low, which leads to the loss of reasons for enterprises to invest in information security, and thus results in a lower average level of personal information security. Yoo and Chang (2014) found that the disclosure and abuse of personal information privacy by internal personnel of Internet service providers was an essential reason for information disclosure, and the current research mainly focused on technical means, while the security research on management factors was ignored.…”
Section: Literature Reviewmentioning
confidence: 99%