Why not comply with information security? An empirical approach for the causes of non-compliance.
Inho HwangDaejin KimTaeha KimSanghyun KimPublished in: Online Inf. Rev. (2017)
Keyphrases
- information security
- countermeasures
- data protection
- security issues
- intrusion detection
- information security management
- smart card
- information systems
- security requirements
- network security
- security level
- information assurance
- computer security
- risk assessment
- e government
- databases
- sensitive data
- risk analysis
- data security
- privacy concerns
- critical infrastructure
- technical issues
- user authentication