Special feature
Cyber extortion — The corporate response

https://doi.org/10.1016/S0167-4048(97)85784-7Get rights and content

First page preview

First page preview
Click to open first page preview

References (0)

Cited by (1)

View full text