Sign in

The sufficiency of the theory of planned behavior for explaining information security policy compliance.

Teodor SommestadHenrik KarlzénJonas Hallberg
Published in: Inf. Comput. Secur. (2015)
Keyphrases
  • access control
  • security policies
  • databases
  • user experience
  • security requirements