What Interrupts Intention to Comply with IS-Security Policy?
Chris MerrittGurpreet DhillonPublished in: AMCIS (2016)
Keyphrases
- security policies
- access control
- network security
- security management
- security concerns
- distributed systems
- access control systems
- security requirements
- security architecture
- network management
- access control policies
- home network
- ubiquitous computing environments
- fine grained
- event logs
- computer networks
- intrusion detection
- xml access control