![Application of Soft Systems Methodology (SSM) to develop Information Systems Security Model for Ethiopian Banking Industry Application of Soft Systems Methodology (SSM) to develop Information Systems Security Model for Ethiopian Banking Industry](https://image.slidesharecdn.com/issecuritymodelbydawitmekonnen-190103125200/85/application-of-soft-systems-methodology-ssm-to-develop-information-systems-security-model-for-ethiopian-banking-industry-1-320.jpg?cb=1669035915)
Application of Soft Systems Methodology (SSM) to develop Information Systems Security Model for Ethiopian Banking Industry
![Project Commitment in the Context of Information Security: Library & Information Science Book Chapter | IGI Global Project Commitment in the Context of Information Security: Library & Information Science Book Chapter | IGI Global](https://coverimages.igi-global.com/cover-images/covers/9781466628007.png)
Project Commitment in the Context of Information Security: Library & Information Science Book Chapter | IGI Global
![PDF) Koskosas I. A SHORT LITERATURE REVIEW IN INFORMATION SYSTEMS SECURITY MANAGEMENT APPROACHES 5 Business Excellence and Management Volume 3 Issue 2 / A SHORT LITERATURE REVIEW IN INFORMATION SYSTEMS SECURITY MANAGEMENT PDF) Koskosas I. A SHORT LITERATURE REVIEW IN INFORMATION SYSTEMS SECURITY MANAGEMENT APPROACHES 5 Business Excellence and Management Volume 3 Issue 2 / A SHORT LITERATURE REVIEW IN INFORMATION SYSTEMS SECURITY MANAGEMENT](https://0.academia-photos.com/14704217/4002057/4673935/s200_nhalyn.romances.jpg)
PDF) Koskosas I. A SHORT LITERATURE REVIEW IN INFORMATION SYSTEMS SECURITY MANAGEMENT APPROACHES 5 Business Excellence and Management Volume 3 Issue 2 / A SHORT LITERATURE REVIEW IN INFORMATION SYSTEMS SECURITY MANAGEMENT
![Application of Soft Systems Methodology (SSM) to develop Information Systems Security Model for Ethiopian Banking Industry Application of Soft Systems Methodology (SSM) to develop Information Systems Security Model for Ethiopian Banking Industry](https://image.slidesharecdn.com/issecuritymodelbydawitmekonnen-190103125200/85/application-of-soft-systems-methodology-ssm-to-develop-information-systems-security-model-for-ethiopian-banking-industry-7-320.jpg?cb=1669035915)
Application of Soft Systems Methodology (SSM) to develop Information Systems Security Model for Ethiopian Banking Industry
![Application of Soft Systems Methodology (SSM) to develop Information Systems Security Model for Ethiopian Banking Industry Application of Soft Systems Methodology (SSM) to develop Information Systems Security Model for Ethiopian Banking Industry](https://image.slidesharecdn.com/issecuritymodelbydawitmekonnen-190103125200/85/application-of-soft-systems-methodology-ssm-to-develop-information-systems-security-model-for-ethiopian-banking-industry-2-320.jpg?cb=1669035915)
Application of Soft Systems Methodology (SSM) to develop Information Systems Security Model for Ethiopian Banking Industry
A Socio-Organizational Approach to Information Systems Security Management in the Context of Internet Banking
![Project Commitment in the Context of Information Security: Library & Information Science Journal Article | IGI Global Project Commitment in the Context of Information Security: Library & Information Science Journal Article | IGI Global](https://coverimages.igi-global.com/cover-images/covers/ijitpm.png)
Project Commitment in the Context of Information Security: Library & Information Science Journal Article | IGI Global
![Encyclopaedia of Information Security Risk Analysis : Disterer, Georg, Koskosas, Ioannis: Amazon.com.be: Books Encyclopaedia of Information Security Risk Analysis : Disterer, Georg, Koskosas, Ioannis: Amazon.com.be: Books](https://m.media-amazon.com/images/I/51C0sh2ocwL._SR600%2C315_PIWhiteStrip%2CBottomLeft%2C0%2C35_SCLZZZZZZZ_FMpng_BG255%2C255%2C255.jpg)
Encyclopaedia of Information Security Risk Analysis : Disterer, Georg, Koskosas, Ioannis: Amazon.com.be: Books
![PDF] The Performance Pyramid Framework to Information Systems Security Management Process | Semantic Scholar PDF] The Performance Pyramid Framework to Information Systems Security Management Process | Semantic Scholar](https://d3i71xaburhd42.cloudfront.net/980b5ad215649b68e2bb790676ac82c2cdfdfa44/3-Figure1-1.png)
PDF] The Performance Pyramid Framework to Information Systems Security Management Process | Semantic Scholar
![Ioannis ANTONIADIS | Professor (Associate) | PhD in Corporate Governance | Management Science and Technology | Research profile Ioannis ANTONIADIS | Professor (Associate) | PhD in Corporate Governance | Management Science and Technology | Research profile](https://i1.rgstatic.net/ii/profile.image/11431281092067756-1666703039883_Q512/Ioannis-Antoniadis.jpg)
Ioannis ANTONIADIS | Professor (Associate) | PhD in Corporate Governance | Management Science and Technology | Research profile
![PDF] The Performance Pyramid Framework to Information Systems Security Management Process | Semantic Scholar PDF] The Performance Pyramid Framework to Information Systems Security Management Process | Semantic Scholar](https://d3i71xaburhd42.cloudfront.net/980b5ad215649b68e2bb790676ac82c2cdfdfa44/6-Table2-1.png)