Sign in

Information security policy compliance model in organizations.

Nader Sohrabi SafaRossouw von SolmsSteven Furnell
Published in: Comput. Secur. (2016)
Keyphrases
  • probabilistic model
  • end users
  • privacy preserving
  • information sharing
  • privacy concerns