Understanding information systems security policy compliance: An integration of the theory of planned behavior and the protection motivation theory.
Princely IfinedoPublished in: Comput. Secur. (2012)
Keyphrases
- security policies
- theory of planned behavior
- information systems
- security architecture
- information security
- access control
- network security
- attitudes toward
- information technology
- privacy concerns
- perceived usefulness
- security requirements
- distributed systems
- online shopping
- data protection
- information quality
- technology acceptance model
- knowledge management