Sign in

The application of information security policies in large UK-based organizations: an exploratory investigation.

Heather FulfordNeil F. Doherty
Published in: Inf. Manag. Comput. Secur. (2003)
Keyphrases
  • security policies
  • information systems
  • information technology
  • information sharing
  • databases
  • access control
  • intrusion detection
  • business processes