IS Security Policy Violations: A Rational Choice Perspective.
Anthony VanceMikko T. SiponenPublished in: J. Organ. End User Comput. (2012)
Keyphrases
- security policies
- access control
- network security
- security management
- security concerns
- distributed systems
- access control systems
- network management
- security requirements
- home network
- security architecture
- unauthorized access
- databases
- event logs
- access control policies
- computer networks
- relational databases
- information security
- fine grained