This paper presents a generic model for information security implementation in organizations. The model presented here is part of an ongoing research stream related to critical infrastructure protection and insider threat and attack analysis. This paper discusses the information security implementation case.
Ignacio J. Martinez-Moyano, Michael E. Samsa, Jame