Skip to Main Content
Keywords: Information systems security
Close
Follow your search
Access your saved searches in your account

Would you like to receive an alert when new items match your search?
Close Modal
Sort by
Journal Articles
Information and Computer Security (2022) 30 (4): 490–516.
Published: 08 February 2022
... Limited Licensed re-use rights only ISP development Information security procedure Nine-Five-circle (NFC) Information systems security Information security commitment Employee behaviour Information security policy development Information security policy There are several definitions...
Journal Articles
Information and Computer Security (2017) 25 (3): 226–239.
Published: 10 July 2017
... Emerald Publishing Limited Licensed re-use rights only Vulnerability Incident Information systems security Security threat This qualitative empirical paper observes the small business mindsets related to the concept of advanced persistent threats (APTs) (Baize, 2012 ; Granadillo et...

or Create an Account

Close Modal
Close Modal