Login / Signup
Does deterrence work in reducing information security policy abuse by employees?
Qing Hu
Zhengchuan Xu
Tamara Dinev
Hong Ling
Published in:
Commun. ACM (2011)
Keyphrases
</>
security policies
information technology
keywords
data mining
information systems
end users
distributed systems
data management
access control