Login / Signup
Understanding Employee Information Security Policy Compliance from Role Theory Perspective.
Forough Nasirpouri Shadbad
David Biros
Published in:
J. Comput. Inf. Syst. (2021)
Keyphrases
</>
keywords
data processing
intrusion detection
network security
security policies