The Role of Security Clearance, Users' Involvement, and Computer Self-Efficacy in the Efficiency of Requirements-Gathering Process: An Information-Systems Case Study in the U.S. Military
The central research problem of this study was the challenges that occur with the United States Joint Warfighters Center's (JWFC) implementation of information systems (IS) requirements-gathering process. Thus, this study investigated the contribution of perceived security clearance (PSC), deve...
Main Author: | Igbonagwam, Okey Azu |
---|---|
Format: | Others |
Published: |
NSUWorks
2008
|
Subjects: | |
Online Access: | http://nsuworks.nova.edu/gscis_etd/184 http://nsuworks.nova.edu/cgi/viewcontent.cgi?article=1183&context=gscis_etd |
Similar Items
-
Getting Grip on Security Requirements Elicitation by Structuring and Reusing Security Requirements Sources
by: Christian Schmitt, et al.
Published: (2015-07-01) -
A Security Requirements Management Framework for Open-Source Software Projects
by: Wang, Wen Tao
Published: (2019) -
An Intelligent Recommender System Based on Association Rule Analysis for Requirement Engineering
by: Mohammad Muhairat, et al.
Published: (2020-01-01) -
A Framework for Security Requirements Elicitation
by: Islam, Gibrail, et al.
Published: (2012) -
An Effective Security Requirements Engineering Framework for Cyber-Physical Systems
by: Shafiq ur Rehman, et al.
Published: (2018-07-01)