Fighting Computer Crime
Policy and its impact on medical record security
Policy and its impact on medical record security
An integrative model of computer abuse based on social control and general deterrence theories
Information and Management
Detecting complex account fraud in the enterprise: The role of technical and non-technical controls
Decision Support Systems
Explaining investors' reaction to internet security breach using deterrence theory
International Journal of Electronic Finance
Journal of Organizational and End User Computing
Information and Management
Hi-index | 48.22 |
Deterring employee intentions to misuse computer systems requires complementary technical and procedural controls.