• Corpus ID: 17380655

Data for Geofencing Security Strategy Model

@inproceedings{IjehDataFG,
  title={Data for Geofencing Security Strategy Model},
  author={Anthony Ijeh and David S. Preston and Chris Imafidon and Titus. B. Watmon and Johnnes Arreymbi and Annette. O. Uwaechie}
}

Figures and Tables from this paper

References

SHOWING 1-5 OF 5 REFERENCES

Management versus security specialists: an empirical study on security related perceptions

TLDR
Empirical evidence gathered justifies theoretical claims that personnel from general management have different perspectives towards network security than personnel from the ne...

―Using Geofencing to Overcome Security Challenges in Wireless Networks: Proof of Concept‖ In proceedings of the Information Society 12th international multi-conference 12-16

  • pdf Proceedings of the International MultiConference of Engineers and Computer Scientists
  • 2009

) ―Security Strategy Models (SSM)‖ In the proceedings of the 4th Annual' Advances in Computing Technology Conference (AC&T) 27

  • ) ―Security Strategy Models (SSM)‖ In the proceedings of the 4th Annual' Advances in Computing Technology Conference (AC&T) 27
  • 2009

Security Strategy Model‖ ICGS3'09 (formerly ICGeS) Conference Proceedings 1st to the 2nd of

  • Security Strategy Model‖ ICGS3'09 (formerly ICGeS) Conference Proceedings 1st to the 2nd of
  • 2009

―Information security risk assessment practice‖

  • IEE International Conference on Global e-Security (ICGeS-05)
  • 2005