The psychology of computer crime — Part
✍
Kathy Buckner; Guy Fielding
📂
Article
📅
1992
🏛
Elsevier Science
⚖ 405 KB
It is the responsibility of each employee or other person (e.g. an outside consultant) authorized to use a password, to maintain strict confidentiality. It is a management responsibility to be sure these security guidelines are followed.