… can occur from several of forms and methods in which this can breach the security of … on the level of secrecy of document should be avoided by employee in avoiding unnecessary leakage … are in agreement and give them an approach to authorize rules that protecting their data …
Mendeley helps you to discover research relevant for your work.
CITATION STYLE
Shamsudin, N. N. A., Yatin, S. F. M., Nazim, N. F. M., Talib, A. W., Sopiee, M. A. M., & Shaari, F. N. (2019). Information Security Behaviors among Employees. International Journal of Academic Research in Business and Social Sciences, 9(6). https://doi.org/10.6007/ijarbss/v9-i6/5972