Sign in

Information Security Policy Compliance: Leadership, Trust, Role Values, and Awareness.

Alex KoohangAlojzy NowakJoanna PaliszkiewiczJeretta Horn Nord
Published in: J. Comput. Inf. Syst. (2020)
Keyphrases
  • security policies
  • data mining
  • business processes
  • business process