1. See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/281907475
Controls for protecting critical information infrastructure from cyberattacks
Conference Paper · December 2014
DOI: 10.1109/WorldCIS.2014.7028160
CITATIONS
9
READS
4,142
2 authors:
Some of the authors of this publication are also working on these related projects:
A User Personality Model: Susceptibility to Phishing on Social Networking Sites View project
Sustainability of using technology View project
Tamir Tsegaye
Rhodes University
5 PUBLICATIONS 11 CITATIONS
SEE PROFILE
Stephen Flowerday
Rhodes University
118 PUBLICATIONS 907 CITATIONS
SEE PROFILE
All content following this page was uploaded by Tamir Tsegaye on 19 October 2019.
The user has requested enhancement of the downloaded file.