Login / Signup
An Integrated Approach to Information Systems Security Policy Violation: The Case of Ethiopia.
Tilahun Muluneh Arage
Tibebe Beshah Tesema
Published in:
INFOS (2016)
Keyphrases
</>
security policies
information systems
access control
network security
security management
databases
network management
access control systems
information technology
relational databases
distributed systems
security architecture
security concerns
knowledge management
security requirements