A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is application/pdf
.
Information System Security Effectiveness Attributes: A Tanzanian Company Case Study
2012
Zenodo
In today-s highly globalised and competitive world access to information plays key role in having an upper hand between business rivals. Hence, proper protection of such crucial resource is core to any modern business. Implementing a successful information security system is basically centered around three pillars; technical solution involving both software and hardware, information security controls to translate the policies and procedure in the system and the people to implement. This paper
doi:10.5281/zenodo.1055633
fatcat:rcbaooluxjbqpduigjm2j4dyf4