Login / Signup
The sufficiency of the theory of planned behavior for explaining information security policy compliance.
Teodor Sommestad
Henrik Karlzén
Jonas Hallberg
Published in:
Inf. Comput. Secur. (2015)
Keyphrases
</>
access control
security policies
databases
user experience
security requirements