Login / Signup

What Drives Information Security Policy Violations among Banking Employees?: Insights from Neutralization and Social Exchange Theory.

Pei-Lee TehPervaiz K. AhmedJohn D'Arcy
Published in: J. Glob. Inf. Manag. (2015)
Keyphrases
  • security policies
  • access control
  • databases
  • information systems
  • data model
  • data sources
  • ubiquitous computing environments
  • network access