Requirements for IT Security Metrics - An Argumentation Theory Based Approach

E. Yasasin, G. Schryen, in: 23rd European Conference on Information Systems (ECIS 2015), 2015.

Download
OA ECIS - Proceedings version1.pdf 669.11 KB
Conference Paper | English
Author
Yasasin, Emrah; Schryen, GuidoLibreCat
Publishing Year
Proceedings Title
23rd European Conference on Information Systems (ECIS 2015)
LibreCat-ID

Cite this

Yasasin E, Schryen G. Requirements for IT Security Metrics - An Argumentation Theory Based Approach. In: 23rd European Conference on Information Systems (ECIS 2015). ; 2015.
Yasasin, E., & Schryen, G. (2015). Requirements for IT Security Metrics - An Argumentation Theory Based Approach. In 23rd European Conference on Information Systems (ECIS 2015).
@inproceedings{Yasasin_Schryen_2015, title={Requirements for IT Security Metrics - An Argumentation Theory Based Approach}, booktitle={23rd European Conference on Information Systems (ECIS 2015)}, author={Yasasin, Emrah and Schryen, Guido}, year={2015} }
Yasasin, Emrah, and Guido Schryen. “Requirements for IT Security Metrics - An Argumentation Theory Based Approach.” In 23rd European Conference on Information Systems (ECIS 2015), 2015.
E. Yasasin and G. Schryen, “Requirements for IT Security Metrics - An Argumentation Theory Based Approach,” in 23rd European Conference on Information Systems (ECIS 2015), 2015.
Yasasin, Emrah, and Guido Schryen. “Requirements for IT Security Metrics - An Argumentation Theory Based Approach.” 23rd European Conference on Information Systems (ECIS 2015), 2015.
All files available under the following license(s):
Copyright Statement:
This Item is protected by copyright and/or related rights. [...]
Main File(s)
Access Level
OA Open Access
Last Uploaded
2018-12-13T15:08:50Z


Export

Marked Publications

Open Data LibreCat

Search this title in

Google Scholar