Sign in

The Role of Extra-Role Behaviors and Social Controls in Information Security Policy Effectiveness.

Jack Shih-Chieh HsuSheng-Pao ShihYu Wen HungPaul Benjamin Lowry
Published in: Inf. Syst. Res. (2015)
Keyphrases
  • security policies
  • relational databases
  • access control
  • human behavior
  • information systems
  • keywords
  • end users
  • data warehouse
  • computer systems
  • social interaction
  • information sharing