M Tang, M Li, T Zhang - Information Technology and Management, 2016 - Springer
Abstract Information security cannot rely solely on technology. More attention must be drawn
to the users' behavioral perspectives regarding information security. In this study, we …