The departure of an employee who had access to keys to your business premises can pose significant security risks. Whether the separation was voluntary or involuntary, it’s essential to take proactive steps to safeguard your business and prevent unauthorized access.
E. Efthimiadis. SIGIR '93: Proceedings of the 16th annual international ACM SIGIR conference on Research and development in information retrieval, page 146--159. New York, NY, USA, ACM, (1993)
T. Joachims, L. Granka, B. Pan, H. Hembrooke, and G. Gay. SIGIR '05: Proceedings of the 28th annual international ACM SIGIR conference on Research and development in information retrieval, page 154--161. New York, NY, USA, ACM Press, (2005)
K. Yang, and Z. Zhang. Proceedings of the 1998 Artificial Intelligence Planning Systems (AIPS) Conference Workshop on Knowledge Engineering and Acquisition for Planning: Bridging Theory and Practice, (1998)
A. Dickinger, A. Scharl, H. Stern, A. Weichselbraun, and K. Wöber. Information and Communication Technologies in Tourism 2008, Proceedings
of the International Conference in Innsbruck, Austria, 2008, Springer, Vienna-New York, (2008)
R. Cummins, and C. O'Riordan. CIKM '05: Proceedings of the 14th ACM international
conference on Information and knowledge management, page 305--306. Bremen, Germany, ACM press, (31 October - 5 November 2005)