Login / Signup
Using Cognitive Dissonance Theory to Explain Information Security Policy Violations.
Nasim Talebi
Mohsen M. Jozani
Tejaswini (Teju) Herath
H. Raghav Rao
Published in:
AMCIS (2018)
Keyphrases
</>
information processing
security policies
databases
distributed systems
data processing
network security