Critical Times for Organizations: What Should Be Done to Curb Workers' Noncompliance With IS Security Policy Guidelines?
Princely IfinedoPublished in: Inf. Syst. Manag. (2016)
Keyphrases
- security policies
- information technology
- access control
- network security
- ubiquitous computing environments
- security management
- security concerns
- distributed systems
- network management
- access control systems
- security requirements
- critical information
- security architecture
- access control policies
- information systems
- home network
- unauthorized access
- knowledge workers
- knowledge management
- security measures
- database systems