EconPapers    
Economics at your fingertips  
 

IT Auditing: Using Controls to Protect Information Assets (1st ed.), by Chris Davis, Mike Schiller, and Kevin Wheeler

Adolfo S. Coronado

Journal of Information Privacy and Security, 2014, vol. 10, issue 2, 108-109

Date: 2014
References: Add references at CitEc
Citations:

Downloads: (external link)
http://hdl.handle.net/10.1080/15536548.2014.924819 (text/html)
Access to full text is restricted to subscribers.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:taf:uipsxx:v:10:y:2014:i:2:p:108-109

Ordering information: This journal article can be ordered from
http://www.tandfonline.com/pricing/journal/uips20

DOI: 10.1080/15536548.2014.924819

Access Statistics for this article

Journal of Information Privacy and Security is currently edited by Chuleeporn Changchit

More articles in Journal of Information Privacy and Security from Taylor & Francis Journals
Bibliographic data for series maintained by Chris Longhurst ().

 
Page updated 2025-03-20
Handle: RePEc:taf:uipsxx:v:10:y:2014:i:2:p:108-109