encryption, decryption, coding, and deterrent/detective/preventive/corrective
Data Assuranceand Security Application
Management
Infrastructure
Resource
N. Jafari Navimipour et al. / Computers in Human Behavior 46 (2015) 57–74
controls. These layers and their related components are discussed in the rest of this section.