End-users Compliance to the Information Security Policy: A Comparison of Motivational Factors.Published in:Communications of the IIMA, 2018, v. 16, n. 4, p. 1By:Straver, Peter;Ravesteyn, PascalPublication type:Article
Gauging ADA Compliance in the 21st Century Business Internet: A Pilot Study.Published in:Communications of the IIMA, 2018, v. 16, n. 4, p. 1By:McDonald, Daniel;Goette, Tanya;Petoia, HannahPublication type:Article
Employee Compliance to Information Security in Retail Stores.Published in:Communications of the IIMA, 2018, v. 16, n. 4, p. 1By:Muhire, Bertrand;Ayyagari, RamakrishnaPublication type:Article