Skip to Main Content
Keywords: Security maturity
Close
Follow your search
Access your saved searches in your account

Would you like to receive an alert when new items match your search?
Close Modal
Sort by
Journal Articles
Journal of Systems and Information Technology (2012) 14 (1): 23–57.
Published: 17 March 2012
... the antecedents of the information security maturity (ISM) of an organization; and to clarify the relationship between ISM and the social and technical factors identified. Design/methodology/approach This study uses quantitative approach, convenience sampling and the required data collected from 970 key...

or Create an Account

Close Modal
Close Modal