Login / Signup
EDI security - re-evaluation of controls and its implications on the organizations.
Pauline Ratnasingham
Published in:
Comput. Secur. (1997)
Keyphrases
</>
security breaches
information technology
information systems
information security
security requirements
access control
network security
security policies
security mechanisms
decision making
intrusion detection
risk management
evaluation method
network management
security systems