

Author: Halliday Sharon Badenhorst Karin von Solms Rossouw
Publisher: Emerald Group Publishing Ltd
ISSN: 0968-5227
Source: Information Management & Computer Security, Vol.4, Iss.1, 1996-01, pp. : 19-31
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content




Gait for Business and Information Technology Risk
By Marks Norman
EDPACS, Vol. 38, Iss. 2, 2008-08 ,pp. :




Enterprise risk management: small business scorecard analysis
Production Planning and Control, Vol. 20, Iss. 4, 2009-06 ,pp. :