Inconsistencies Between Information Security Policy Compliance and Shadow IT Usage.
Autor: | Huang, Hsieh-Hong1 (AUTHOR) kory@nttu.edu.tw, Lin, Jian-Wei2 (AUTHOR) |
---|---|
Zdroj: | Journal of Computer Information Systems. 2024, Vol. 64 Issue 4, p554-564. 11p. |
Databáze: | Business Source Ultimate |
Externí odkaz: |