Login / Signup

An integrative model of computer abuse based on social control and general deterrence theories.

Sang M. LeeSang-Gun LeeSangjin Yoo
Published in: Inf. Manag. (2004)
Keyphrases