Sign in

Social control through deterrence on the compliance with information security policy.

Myeonggil ChoiJeongseok Song
Published in: Soft Comput. (2018)
Keyphrases
  • security policies
  • ubiquitous computing environments
  • real world
  • user interface
  • xml documents
  • computer systems
  • event logs