Harwood, Ian A.; Turnock, Stephen R.; Ashleigh, Melanie J. - In: European Management Journal 32 (2014) 1, pp. 84-90
burst and map these forces to ways in which confidentiality may be breached. Many attributes are mapped, the key ones being …: the embedded value within the system, the criticality of maintaining confidentiality, increasing pressure, the … model which aims to minimise the risk of a confidentiality breach. …