![Open access](/images/ico/o.png)
![](/images/ico/ico5.png)
Author: Heckman Mark R. Schell Roger R.
Publisher: MDPI
E-ISSN: 2078-2489|7|2|23-23
ISSN: 2078-2489
Source: Information, Vol.7, Iss.2, 2016-04, pp. : 23-23
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
![](/images/ico/o.png)
![](/images/ico/ico5.png)
![](/images/ico/o.png)
![](/images/ico/ico5.png)
![](/images/ico/o.png)
![](/images/ico/ico5.png)
![](/images/ico/o.png)
![](/images/ico/ico5.png)
Using Financial Instruments to Transfer the Information Security Risks
By Pandey Pankaj Snekkenes Einar
Future Internet, Vol. 8, Iss. 2, 2016-05 ,pp. :
![](/images/ico/o.png)
![](/images/ico/ico5.png)
By Massri Khalil Vitaletti Andrea Vernata Alessandro Chatzigiannakis Ioannis
Journal of Sensor and Actuator Networks, Vol. 5, Iss. 2, 2016-03 ,pp. :