Sign in

Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory.

Lijiao ChengYing LiWenli LiEric HolmQingguo Zhai
Published in: Comput. Secur. (2013)
Keyphrases