Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory

Lijiao Cheng, Ying Li, Wenli Li, Eric Holm, Qingguo Zhai. Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory. Computers & Security, 39:447-459, 2013. [doi]

@article{ChengLLHZ13,
  title = {Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory},
  author = {Lijiao Cheng and Ying Li and Wenli Li and Eric Holm and Qingguo Zhai},
  year = {2013},
  doi = {10.1016/j.cose.2013.09.009},
  url = {http://dx.doi.org/10.1016/j.cose.2013.09.009},
  researchr = {https://researchr.org/publication/ChengLLHZ13},
  cites = {0},
  citedby = {0},
  journal = {Computers & Security},
  volume = {39},
  pages = {447-459},
}