Unpacking Security Policy Compliance: The Motivators and Barriers of Employees' Security Behaviors.
John M. BlytheLynne M. CoventryLinda LittlePublished in: SOUPS (2015)
Keyphrases
- security policies
- access control
- security requirements
- security management
- network security
- security concerns
- network management
- distributed systems
- security measures
- access control systems
- cyber attacks
- security architecture
- access control policies
- information technology
- home network
- multilevel secure
- job satisfaction
- access control mechanism
- unauthorized access
- xml access control
- security analysis
- ubiquitous computing environments
- data mining
- security mechanisms
- computer networks
- data processing
- database systems