Kouatli, Issam - In: Journal of Management History 20 (2014) 4, pp. 409-433
Purpose – The purpose of this paper is to classify and categorize the vulnerability types emerged with time as information technology (IT) systems evolved. This comparative study aims to compare the seriousness of the old well-known vulnerabilities that may still exist with lower possibility...