Login / Signup

Reliability, Validity, and Strength of a Unified Model for Information Security Policy Compliance.

Alex KoohangJeretta Horn NordZoroayka V. SandovalJoanna Paliszkiewicz
Published in: J. Comput. Inf. Syst. (2021)
Keyphrases
  • unified model
  • access control
  • security policies
  • information systems
  • data processing
  • cloud computing
  • event logs