Lijiao Cheng, Ying Li, Wenli Li, Eric Holm, Qingguo Zhai. Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory. Computers & Security, 39:447-459, 2013. [doi]
@article{ChengLLHZ13, title = {Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory}, author = {Lijiao Cheng and Ying Li and Wenli Li and Eric Holm and Qingguo Zhai}, year = {2013}, doi = {10.1016/j.cose.2013.09.009}, url = {http://dx.doi.org/10.1016/j.cose.2013.09.009}, researchr = {https://researchr.org/publication/ChengLLHZ13}, cites = {0}, citedby = {0}, journal = {Computers & Security}, volume = {39}, pages = {447-459}, }