Changes
Jump to navigation
Jump to search
← Older edit
Newer edit →
Technology Threat Avoidance Theory (TTAT)
(view source)
Revision as of 07:25, 28 February 2017
52 bytes added
,
07:25, 28 February 2017
→Diagram/schematic of theory
Line 26:
Line 26:
== Diagram/schematic of theory ==
== Diagram/schematic of theory ==
−
[[File:Figure 1- The Process of IT Threat Avoidance.jpg|thumb|Figure 1: The Process of IT Threat Avoidance]]
+
[[File:Figure 1- The Process of IT Threat Avoidance.jpg|thumb|Figure 1: The Process of IT Threat Avoidance
|none|542x542px
]]
−
[[File:Figure 2- The Variance Theory View of TTAT.jpg|thumb|Figure 2: The Variance Theory View of TTAT]]
+
[[File:Figure 2- The Variance Theory View of TTAT.jpg|thumb|Figure 2: The Variance Theory View of TTAT
|none|547x547px
]]
== Originating author(s) ==
== Originating author(s) ==
Line 36:
Line 36:
== Originating area ==
== Originating area ==
−
*
+
*
IS security
== Level of analysis ==
== Level of analysis ==
Line 60:
Line 60:
== Date last updated ==
== Date last updated ==
−
*
+
*
28 Feb 2017
Anupriya Khan
23
edits
Navigation menu
Personal tools
Create account
Log in
Namespaces
IS Theory
Discussion
Variants
Views
Read
View source
View history
More
Search
Navigation
Main page
Recent changes
Random page
Help about MediaWiki
Tools
Special pages
Printable version