1.
Musbah Abobaker Musbah. Information Security Management Requirments Model Through Data Life Cycle. IJEIT [Internet]. 2024 Jun. 19 [cited 2025 Apr. 19];6(1). Available from: https://ijeit.misuratau.edu.ly/index.php/ijeit/article/view/300