Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory

Lijiao Cheng, Ying Li, Wenli Li, Eric Holm, Qingguo Zhai. Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory. Computers & Security, 39:447-459, 2013. [doi]

Authors

Lijiao Cheng

This author has not been identified. Look up 'Lijiao Cheng' in Google

Ying Li

This author has not been identified. Look up 'Ying Li' in Google

Wenli Li

This author has not been identified. Look up 'Wenli Li' in Google

Eric Holm

This author has not been identified. Look up 'Eric Holm' in Google

Qingguo Zhai

This author has not been identified. Look up 'Qingguo Zhai' in Google