C
search
search
reviewers
reviewers
feeds
feeds
assignments
assignments
settings
logout
Does deterrence work in reducing information security policy abuse by employees?
Qing Hu
Zhengchuan Xu
Tamara Dinev
Hong Ling
Published in:
Commun. ACM (2011)
Keyphrases
</>
security policies
information technology
keywords
data mining
information systems
end users
distributed systems
data management
access control