See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/261699399 Some Common Practices In Relation To Breaches In Information Technology Security: Does Stiffening Access Reduce Risk? Article ยท January 2010 CITATION 1 READS 51 3 authors, including: Some of the authors of this publication are also working on these related projects: The Economic Benefits of a Biblical Name View project Emmanuel U Opara Prairie View A&M University 23 PUBLICATIONS 28 CITATIONS SEE PROFILE Reginald L. Bell Prairie View A&M University 89 PUBLICATIONS 233 CITATIONS SEE PROFILE All content following this page was uploaded by Reginald L. Bell on 17 April 2014. The user has requested enhancement of the downloaded file. All in-text references underlined in blue are added to the original document and are linked to publications on ResearchGate, letting you access and read them immediately.