Login / Signup
Reliability, Validity, and Strength of a Unified Model for Information Security Policy Compliance.
Alex Koohang
Jeretta Horn Nord
Zoroayka V. Sandoval
Joanna Paliszkiewicz
Published in:
J. Comput. Inf. Syst. (2021)
Keyphrases
</>
unified model
access control
security policies
information systems
data processing
cloud computing
event logs