The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.03 - May-June (2012 vol.10)
pp: 3
Shari Lawrence Pfleeger , Dartmouth College
ABSTRACT
Understanding and providing incentives for good security behavior can be more effective and welcome than disruptive or constraining technology.
INDEX TERMS
security architecture, embedded security, design
CITATION
Shari Lawrence Pfleeger, "A Key to the Castle", IEEE Security & Privacy, vol.10, no. 3, pp. 3, May-June 2012, doi:10.1109/MSP.2012.64
22 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool