Security Constructs
Home
Categories
Constructs
Publications
Construct:
Source competency
This construct belongs to the following categories:
Uncategorised
This construct is used by:
Sommestad et al., 2014:
Variables Influencing Information Security Policy Compliance: A Systematic Review of Quantitative Studies
Questions given: example
Papers using this construct cite the following papers for the source of this construct:
Siponen et al., 2010:
Compliance with Information Security Policies: An Empirical Investigation