Author: Sheng Weiguo Howells Gareth Fairhurst Michael Deravi Farzin Chen Shengyong
Publisher: Emerald Group Publishing Ltd
ISSN: 0968-5227
Source: Information Management & Computer Security, Vol.20, Iss.3, 2012-07, pp. : 207-221
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract