Skip to Main Content
Keywords: General morphological analysis
Close
Follow your search
Access your saved searches in your account

Would you like to receive an alert when new items match your search?
Close Modal
Sort by
Journal Articles
Information and Computer Security (2017) 25 (3): 259–278.
Published: 10 July 2017
... cyber security is well appreciated, research focusing intensely on cyber security culture is still in its infancy. Additionally, knowledge on the subject is not clearly bounded and defined. Design/methodology/approach General morphological analysis (GMA) is used to define, structure and analyse...

or Create an Account

Close Modal
Close Modal