Login / Signup

Stakeholder perceptions of information security policy: Analyzing personal constructs.

Spyridon SamonasGurpreet DhillonAhlam Almusharraf
Published in: Int. J. Inf. Manag. (2020)
Keyphrases
  • access control
  • security policies
  • computer systems
  • real world
  • keywords
  • end users
  • data warehouse
  • ubiquitous computing environments