Login / Signup
Information security policy compliance-eliciting requirements for a computerized software to support value-based compliance analysis.
Fredrik Karlsson
Ella Kolkowska
Johan Petersson
Published in:
Comput. Secur. (2022)
Keyphrases
</>
security policies
end users
data analysis
ubiquitous computing environments
data sources
distributed systems
computer systems
network traffic