

Author: Al-Awadi K. Saidani M.
Publisher: Emerald Group Publishing Ltd
ISSN: 0968-5227
Source: Information Management & Computer Security, Vol.18, Iss.3, 2010-01, pp. : 173-184
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content






Do we need a security culture?
VINE, Vol. 31, Iss. 2, 2001-06 ,pp. :




Information Management & Computer Security, Vol. 4, Iss. 2, 1996-02 ,pp. :