Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
  • Warman A. (1993). User Considerations in Communicating Information Technology Security Requirements. Systems Science. 10.1007/978-1-4615-2862-3_83. (469-474).

    http://link.springer.com/10.1007/978-1-4615-2862-3_83

  • Wilson J, Turban E and Zviran M. (1992). Information systems security. International Journal of Information Management: The Journal for Information Professionals. 12:2. (105-119). Online publication date: 1-Jun-1992.

    https://doi.org/10.1016/0268-4012(92)90017-K