Nguyen, Trang - In: Online Information Review 48 (2023) 3, pp. 500-522
Purpose Despite the growing concern about security breaches and risks emerging from Shadow IT usage, a type of information security violation committed by organizational insiders, this phenomenon has received little scholarly attention. By integrating the dual-factor theory, unified theory of...