Inconsistencies Between Information Security Policy Compliance and Shadow IT Usage.

Autor: Huang, Hsieh-Hong1 (AUTHOR) kory@nttu.edu.tw, Lin, Jian-Wei2 (AUTHOR)
Zdroj: Journal of Computer Information Systems. 2024, Vol. 64 Issue 4, p554-564. 11p.
Databáze: Business Source Ultimate