Understanding employees' adoption of the Bring-Your-Own-Device (BYOD): the roles of information security-related conflict and fatigue.
Hao ChenYing LiLirong ChenJin YinPublished in: J. Enterp. Inf. Manag. (2021)
Keyphrases
- information security
- information systems
- e government
- countermeasures
- security issues
- information technology
- information security management
- intrusion detection
- security level
- smart card
- risk assessment
- information assurance
- technical issues
- smart grid
- network security
- sensitive data
- security requirements
- iso iec
- design theory
- third party
- computer systems
- data analysis