@dblp

Compliance with Information Security Policies: An Empirical Investigation.

, , and . IEEE Computer, 43 (2): 64-71 (2010)

Links and resources

Tags