Review of IS Security Policy Compliance: Toward the Building Blocks of an IS Security Theory.
Puzant BalozianDorothy E. LeidnerPublished in: Data Base (2017)
Keyphrases
- building blocks
- security policies
- access control
- security management
- network security
- security requirements
- security concerns
- distributed systems
- access control systems
- network management
- security measures
- security architecture
- cyber attacks
- access control policies
- ubiquitous computing environments
- home network
- software components
- fine grained
- information systems
- security mechanisms
- access control mechanism
- unauthorized access