Shedden, Piya; Scheepers, Rens; Smith, Wally; Ahmad, Atif - 2011
Purpose – Many methodologies exist to assess the security risks associated with unauthorized leakage, modification and interruption of information used by organisations. This paper argues that these methodologies have a traditional orientation towards the identification and assessment of...