Return to Article Details Effective Policies to Protect Information Resources: Identity Management and Organizational Access Studies X Download Download PDF