Login / Signup

Understanding Employee Information Security Policy Compliance from Role Theory Perspective.

Forough Nasirpouri ShadbadDavid Biros
Published in: J. Comput. Inf. Syst. (2021)
Keyphrases
  • keywords
  • data processing
  • intrusion detection
  • network security
  • security policies