Login / Signup
Exploring information security controls using information fraud episodes: case study evidence from a large telecommunications firm.
Sigi Goode
David Lacey
Published in:
ECIS (2011)
Keyphrases
</>
higher level
database
neural network
user interaction
structural information
information flow
information retrieval
multimedia
information processing
information sharing
information content
information fusion
cost sensitive