共 50 条
- [41] An Integrated Approach to Information Systems Security Policy Violation: The Case of Ethiopia INTERNATIONAL CONFERENCE ON INFORMATICS AND SYSTEMS (INFOS 2016), 2016, : 228 - 232
- [42] Understanding Information Security Policy Violation from a Situational Action Perspective JOURNAL OF THE ASSOCIATION FOR INFORMATION SYSTEMS, 2021, 22 (03): : 739 - 772
- [43] Policy, Legal, Legislation and Compliance Saudi Personnel Compliance and Adaption to Recent Security Measures 2018 21ST SAUDI COMPUTER SOCIETY NATIONAL COMPUTER CONFERENCE (NCC), 2018,
- [46] Security Engine Management of Router based on Security Policy PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 10, 2005, 10 : 116 - 119
- [49] Information Security Policy Compliance: An Empirical Study of Ethical Ideology PROCEEDINGS OF THE 46TH ANNUAL HAWAII INTERNATIONAL CONFERENCE ON SYSTEM SCIENCES, 2013, : 3018 - 3027