Login / Signup
The application of information security policies in large UK-based organizations: an exploratory investigation.
Heather Fulford
Neil F. Doherty
Published in:
Inf. Manag. Comput. Secur. (2003)
Keyphrases
</>
security policies
information systems
information technology
information sharing
databases
access control
intrusion detection
business processes