… can occur from several of forms and methods in which this can breach the security of … on the level of secrecy of document should be avoided by employee in avoiding unnecessary leakage … are in agreement and give them an approach to authorize rules that protecting their data …
CITATION STYLE
Shamsudin, N. N. A., Yatin, S. F. M., Nazim, N. F. M., Talib, A. W., Sopiee, M. A. M., & Shaari, F. N. (2019). Information Security Behaviors among Employees. International Journal of Academic Research in Business and Social Sciences, 9(6). https://doi.org/10.6007/ijarbss/v9-i6/5972
Mendeley helps you to discover research relevant for your work.