Login / Signup
Are Prevailing Theories and Practices of IS Security Management Adequate? An Evaluation and Call to Action.
John G. Mooney
Mark W. S. Chun
Anat Hovav
Joey F. George
Charla Griffy-Brown
Published in:
AMCIS (2005)
Keyphrases
</>
security management
multi tier
network security
security policies
case study
low cost
security issues