Department
Information Systems
Document Type
Article
Publication Date
8-2003
Abstract
A firm can build more effective security strategies by identifying and ranking the severity of potential threats to its IS efforts.
Journal Title
Communications of the ACM
Journal ISSN
0001-0782
Volume
46
Issue
8
First Page
91
Last Page
95
Digital Object Identifier (DOI)
10.1145/859670.859675
COinS