Neutralization Theory-Based Model for the alleviation of Shadow IT-Induced security threats
Crossref DOI link: https://doi.org/10.30574/wjaets.2025.16.3.1306
Published Online: 2025-09-30
Update policy: https://doi.org/10.30574/wjaets.ourcrossmarkpolicy
Adinda William Odindo,
Silvance Abeka,
Joshua Agola,