

Publisher: IGI Global_journal
E-ISSN: 1938-7865|9|2|1-16
ISSN: 1938-7857
Source: Journal of Information Technology Research (JITR), Vol.9, Iss.2, 2016-04, pp. : 1-16
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content






Positive Security, Risk Management, and Compliance
EDPACS, Vol. 47, Iss. 4, 2013-04 ,pp. :




The Impact of Hobby Lobby on Compliance Evaluations
EDPACS, Vol. 50, Iss. 6, 2014-12 ,pp. :