Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory.
Lijiao ChengYing LiWenli LiEric HolmQingguo ZhaiPublished in: Comput. Secur. (2013)
Keyphrases
- security policies
- structuration theory
- access control
- theoretical frameworks
- information technology
- counter terrorism
- network security
- security management
- ubiquitous computing environments
- information systems
- knowledge sharing
- social interaction
- distributed systems
- security concerns
- e government
- social networks
- network traffic
- access control policies
- knowledge management