How Do Paternalistic Leaders Motivate Employees' Information Security Compliance? Building a Climate and Applying Sanctions.
Jiawen ZhuGengzhong FengHuigang LiangKwok-Leung TsuiPublished in: J. Assoc. Inf. Syst. (2023)
Keyphrases
- information security
- countermeasures
- intrusion detection
- information systems
- security issues
- smart card
- information assurance
- network security
- computer security
- data protection
- information technology
- security requirements
- information security management
- privacy concerns
- sensitive data
- technical issues
- e government
- risk analysis
- smart grid
- risk assessment
- data security
- security level
- cyber defense
- security risks
- data mining
- critical infrastructure
- case study
- real world