Enemy at the Gate: Threats to Information Security

Abstract

A firm can build more effective security strategies by identifying and ranking the severity of potential threats to its IS efforts

    Similar works