Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory

Lijiao Cheng, Ying Li, Wenli Li, Eric Holm, Qingguo Zhai. Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory. Computers & Security, 39:447-459, 2013. [doi]

Abstract

Abstract is missing.