The following discussion is an archived debate of the proposed deletion of the article below. Please do not modify it. Subsequent comments should be made on the appropriate discussion page (such as the article's talk page or in a deletion review). No further edits should be made to this page.

The result was delete. Drmies (talk) 17:38, 26 January 2018 (UTC)[reply]

Reference Model of Information Assurance and Security[edit]

Reference Model of Information Assurance and Security (edit | talk | history | protect | delete | links | watch | logs | views) – (View log · Stats)
(Find sources: Google (books · news · scholar · free images · WP refs· FENS · JSTOR · TWL)

This is a thing, it exists, but all the references have one degree of separation form the original author, if that. Google shows remarkably few hits for the title, quoted, and I have not encountered the term in dealing with complex transformation programs. Guy (Help!) 09:32, 19 January 2018 (UTC)[reply]

Note: This discussion has been included in the list of Computing-related deletion discussions. XOR'easter (talk) 05:02, 23 January 2018 (UTC)[reply]
The above discussion is preserved as an archive of the debate. Please do not modify it. Subsequent comments should be made on the appropriate discussion page (such as the article's talk page or in a deletion review). No further edits should be made to this page.