Login / Signup
Legitimising Information Security Policy during Policy Crafting: Exploring Legitimising Strategies.
Elina Niemimaa
Published in:
ACIS (2016)
Keyphrases
</>
security policies
mobile devices
machine learning
access control
computer systems
access control policies
event logs