"Are Prevailing Theories and Practices of IS Security Management Adequate? ..."

John G. Mooney et al. (2005)

Details and statistics

DOI:

access: closed

type: Conference or Workshop Paper

metadata version: 2015-03-30

a service of  Schloss Dagstuhl - Leibniz Center for Informatics