{"_id":"GEn5sgrtADbfvnCBz","bibbaseid":"thomson-corporategovernanceinformationsecuritytheweakestlink-2002","author_short":["Thomson, K."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","added-at":"2020-03-12T00:00:00.000+0100","author":[{"propositions":[],"lastnames":["Thomson"],"firstnames":["Kerry-Lynn"],"suffixes":[]}],"biburl":"https://www.bibsonomy.org/bibtex/20a736ee00ab5951aac8054eeaae5f337/dblp","booktitle":"ISSA","crossref":"conf/issa/2002","ee":"http://icsa.cs.up.ac.za/issa/2002/proceedings/A007.pdf","interhash":"0ee2088703e2c14e70968e5432075d1a","intrahash":"0a736ee00ab5951aac8054eeaae5f337","keywords":"dblp","pages":"1-10","publisher":"ISSA, Pretoria, South Africa","timestamp":"2020-03-13T12:56:09.000+0100","title":"Corporate Governance: Information security the weakest link?","url":"http://dblp.uni-trier.de/db/conf/issa/issa2002.html#Thomson02","year":"2002","bibtex":"@inproceedings{conf/issa/Thomson02,\n added-at = {2020-03-12T00:00:00.000+0100},\n author = {Thomson, Kerry-Lynn},\n biburl = {https://www.bibsonomy.org/bibtex/20a736ee00ab5951aac8054eeaae5f337/dblp},\n booktitle = {ISSA},\n crossref = {conf/issa/2002},\n ee = {http://icsa.cs.up.ac.za/issa/2002/proceedings/A007.pdf},\n interhash = {0ee2088703e2c14e70968e5432075d1a},\n intrahash = {0a736ee00ab5951aac8054eeaae5f337},\n keywords = {dblp},\n pages = {1-10},\n publisher = {ISSA, Pretoria, South Africa},\n timestamp = {2020-03-13T12:56:09.000+0100},\n title = {Corporate Governance: Information security the weakest link?},\n url = {http://dblp.uni-trier.de/db/conf/issa/issa2002.html#Thomson02},\n year = 2002\n}\n\n","author_short":["Thomson, K."],"key":"conf/issa/Thomson02","id":"conf/issa/Thomson02","bibbaseid":"thomson-corporategovernanceinformationsecuritytheweakestlink-2002","role":"author","urls":{"Link":"http://icsa.cs.up.ac.za/issa/2002/proceedings/A007.pdf","Paper":"http://dblp.uni-trier.de/db/conf/issa/issa2002.html#Thomson02"},"keyword":["dblp"],"metadata":{"authorlinks":{}}},"bibtype":"inproceedings","biburl":"http://www.bibsonomy.org/bib/author/lynn?items=1000","dataSources":["jrmreZGeQB4kJdEkY"],"keywords":["dblp"],"search_terms":["corporate","governance","information","security","weakest","link","thomson"],"title":"Corporate Governance: Information security the weakest link?","year":2002}