Shedden, Piya; Scheepers, Rens; Smith, Wally; Ahmad, Atif - 2011
Purpose – Many methodologies exist to assess the security risks associated with unauthorized leakage, modification and … cultivation and deployment of organisational knowledge. The purpose of this paper is to explore how security risk assessment … applied to a complex data backup process. Follow-up interviews were conducted with the organisation’s security managers to …