Inproceedings,

Are Prevailing Theories and Practices of IS Security Management Adequate? An Evaluation and Call to Action.

, , , , and .
AMCIS, page 400. Association for Information Systems, (2005)

Meta data

Tags

Users

  • @dblp

Comments and Reviews