Skip to Main Content
Keywords: Theory
Close
Follow your search
Access your saved searches in your account

Would you like to receive an alert when new items match your search?
Close Modal
Sort by
Journal Articles
Information Management & Computer Security (2002) 10 (2): 57–63.
Published: 01 May 2002
...Jintae Lee; Younghwa Lee Past studies suggest that computer security countermeasures such as security policies, systems, and awareness programs would be effective in preventing computer abuse in organizations. They are based on the general deterrence theory, which posits that when an organization...

or Create an Account

Close Modal
Close Modal