Zhang, Chen; Simon, Judith C.; Lee, Euntae “Ted” - In: Journal of Organizational and End User Computing (JOEUC) 28 (2016) 4, pp. 73-90
Given the rising IT security and privacy concerns, organizations are increasing their spending to strengthen technical protections. However, the problem of individuals wanting to find ways to gain access to IT resources improperly remains. To gain a better understanding of individuals'...