Login / Signup

A canonical analysis of intentional information security breaches by insiders.

Jordan Shropshire
Published in: Inf. Manag. Comput. Secur. (2009)
Keyphrases
  • information systems
  • low cost