Login / Signup
Internalization of Information Security Policy and Information Security Practice: A Comparison with Compliance.
Minjung Park
Sangmi Chai
Published in:
HICSS (2018)
Keyphrases
</>
information security
network security
information sharing
security policies
security level
data mining
computer systems
security requirements
case study
information technology
end users
access control
intrusion detection