Login / Signup

Does deterrence work in reducing information security policy abuse by employees?

Qing HuZhengchuan XuTamara DinevHong Ling
Published in: Commun. ACM (2011)
Keyphrases
  • security policies
  • information technology
  • keywords
  • data mining
  • information systems
  • end users
  • distributed systems
  • data management
  • access control