Login / Signup
Risk of Insider Threats in Information Technology Outsourcing: Can Deceptive Techniques be Applied?
Pravesh Gaonjur
Chandradeo Bokhoree
Published in:
Security and Management (2006)
Keyphrases
</>
information technology
information systems
risk management
database
researchers and practitioners
data mining
data sets
business process