

Author: Hagen Janne Merete Albrechtsen Eirik Hovden Jan
Publisher: Emerald Group Publishing Ltd
ISSN: 0968-5227
Source: Information Management & Computer Security, Vol.16, Iss.4, 2008-10, pp. : 377-397
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content








Information Security Governance: A Practical Development and Implementation Approach
By Hinson Gary
EDPACS, Vol. 43, Iss. 2, 2011-02 ,pp. :