Login / Signup
Employees' Compliance with BYOD Security Policy: Insights from Reactance, Organizational Justice, and Protection Motivation Theory.
Frida Ferdani Putri
Anat Hovav
Published in:
ECIS (2014)
Keyphrases
</>
security policies
security architecture
information technology
access control
information systems
data protection
distributed systems
security management
network management
security concerns
real world
network security
knowledge workers
security requirements
information security
knowledge management
data mining