|
Volumn 67, Issue 2, 2013, Pages
|
Strategies for safeguarding security of mobile computing.
|
Author keywords
[No Author keywords available]
|
Indexed keywords
ACCESS TO INFORMATION;
ARTICLE;
COMPUTER SECURITY;
CONFIDENTIALITY;
HOSPITAL MANAGEMENT;
IN SERVICE TRAINING;
MANAGEMENT;
METHODOLOGY;
ORGANIZATION AND MANAGEMENT;
POLICY;
RISK ASSESSMENT;
UNITED STATES;
WIRELESS COMMUNICATION;
ACCESS TO INFORMATION;
COMPUTER SECURITY;
CONFIDENTIALITY;
HOSPITAL COMMUNICATION SYSTEMS;
INSERVICE TRAINING;
ORGANIZATIONAL POLICY;
POLICY MAKING;
RISK ASSESSMENT;
UNITED STATES;
WIRELESS TECHNOLOGY;
|
EID: 84875909733
PISSN: 07350732
EISSN: None
Source Type: None
DOI: None Document Type: Article |
Times cited : (2)
|
References (0)
|