The utilization of trend analysis in the effective monitoring of information security. Part 2: the model

Martin Botha, Rossouw von Solms. The utilization of trend analysis in the effective monitoring of information security. Part 2: the model. Inf. Manag. Comput. Security, 10(1):5-11, 2002. [doi]

Authors

Martin Botha

This author has not been identified. Look up 'Martin Botha' in Google

Rossouw von Solms

This author has not been identified. Look up 'Rossouw von Solms' in Google