Return to Article Details DETECTION OF INFORMATION SECURITY VIOLATIONS IN DATA FLOWS IN THE ELECTRONIC GOVERNMENT SYSTEM Download Download PDF