

Author: Kruger Hennie Drevin Lynette Steyn Tjaart
Publisher: Emerald Group Publishing Ltd
ISSN: 0968-5227
Source: Information Management & Computer Security, Vol.18, Iss.5, 2010-11, pp. : 316-327
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content








Raising information security awareness in the academic setting
By Cox Andrew Connolly Sarah Currall James
VINE, Vol. 31, Iss. 2, 2001-06 ,pp. :