Emerald, Information Management and Computer Security, 5(14), 2006
DOI: 10.1108/imcs.2006.04614eaa.001
Export citation
Search in Google Scholar
Full text: Unavailable