Login / Signup

Information security policy compliance-eliciting requirements for a computerized software to support value-based compliance analysis.

Fredrik KarlssonElla KolkowskaJohan Petersson
Published in: Comput. Secur. (2022)
Keyphrases
  • security policies
  • end users
  • data analysis
  • ubiquitous computing environments
  • data sources
  • distributed systems
  • computer systems
  • network traffic