Security Technology.docx

2020-05-18T21:46:19Z (GMT) by Pauline Williams-Banta David Cross
Security professionals were surveyed using the Human Aspects of Information Security Questionnaire. Three research questions were asked and analyzed to determine issues and protocols used to protect sensitive information.