Special featureCyber extortion — The corporate response
References (0)
Cited by (1)
Ameta-analysis of security risk theory literature in is from 2000-2006
2007, Association for Information Systems - 13th Americas Conference on Information Systems, AMCIS 2007: Reaching New Heights
Copyright © 1997 Published by Elsevier Ltd.