Requirements for IT Security Metrics - An Argumentation Theory Based Approach
E. Yasasin, G. Schryen, in: 23rd European Conference on Information Systems (ECIS 2015), 2015.
Download
ECIS - Proceedings version1.pdf
669.11 KB
Conference Paper
| English
Author
Yasasin, Emrah;
Schryen, GuidoLibreCat
Publishing Year
Proceedings Title
23rd European Conference on Information Systems (ECIS 2015)
LibreCat-ID
Cite this
Yasasin E, Schryen G. Requirements for IT Security Metrics - An Argumentation Theory Based Approach. In: 23rd European Conference on Information Systems (ECIS 2015). ; 2015.
Yasasin, E., & Schryen, G. (2015). Requirements for IT Security Metrics - An Argumentation Theory Based Approach. In 23rd European Conference on Information Systems (ECIS 2015).
@inproceedings{Yasasin_Schryen_2015, title={Requirements for IT Security Metrics - An Argumentation Theory Based Approach}, booktitle={23rd European Conference on Information Systems (ECIS 2015)}, author={Yasasin, Emrah and Schryen, Guido}, year={2015} }
Yasasin, Emrah, and Guido Schryen. “Requirements for IT Security Metrics - An Argumentation Theory Based Approach.” In 23rd European Conference on Information Systems (ECIS 2015), 2015.
E. Yasasin and G. Schryen, “Requirements for IT Security Metrics - An Argumentation Theory Based Approach,” in 23rd European Conference on Information Systems (ECIS 2015), 2015.
Yasasin, Emrah, and Guido Schryen. “Requirements for IT Security Metrics - An Argumentation Theory Based Approach.” 23rd European Conference on Information Systems (ECIS 2015), 2015.
All files available under the following license(s):
Copyright Statement:
This Item is protected by copyright and/or related rights. [...]
Main File(s)
File Name
ECIS - Proceedings version1.pdf
669.11 KB
Access Level
Open Access
Last Uploaded
2018-12-13T15:08:50Z