• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

Does deterrence work in reducing information security policy abuse by employees?

Qing HuZhengchuan XuTamara DinevHong Ling
Published in: Commun. ACM (2011)
Keyphrases
  • security policies
  • information technology
  • keywords
  • data mining
  • information systems
  • end users
  • distributed systems
  • data management
  • access control