[1]
“Information Security Management Requirments Model Through Data Life Cycle”, IJEIT, vol. 6, no. 1, Jun. 2024, doi: 10.36602/ijeit.v6i1.300.