|
Volumn 12, Issue 3, 2008, Pages 22-30
|
Searching for the right fit: Balancing IT security management model trade-offs
|
Author keywords
Book reviews; Computer security professionals; Internet; Internet security; Interviews; Organizations; Security; Security management models; Standards; Training
|
Indexed keywords
INFORMATION TECHNOLOGY;
PERSONNEL TRAINING;
STANDARDS;
USABILITY ENGINEERING;
SECURITY MANAGEMENT MODEL;
SECURITY OF DATA;
|
EID: 44449146478
PISSN: 10897801
EISSN: None
Source Type: Journal
DOI: 10.1109/MIC.2008.61 Document Type: Article |
Times cited : (7)
|
References (8)
|