Yaokumah, Winfred; Brown, Steven; Dawson, Alex Ansah - In: Journal of Information Technology Research (JITR) 9 (2016) 2, pp. 1-16
security policy is fully mediated by security roles and responsibilities, operations security activities, and security … monitoring and review activities. Security policy strongly influences operations security activities and has the greatest effect …