Department

Information Systems

Document Type

Article

Publication Date

8-2003

Abstract

A firm can build more effective security strategies by identifying and ranking the severity of potential threats to its IS efforts.

Journal

Communications of the ACM

Journal ISSN

0001-0782

Volume

46

Issue

8

First Page

91

Last Page

95

Digital Object Identifier (DOI)

10.1145/859670.859675

Share

COinS