1] E. Alata, M. Dacier, Y. Deswarte, M. Kaaâniche, K. Kortchinsky, V. Nicomette, V. H. Pham, and F. Pouget. Collection and ana
![User Acceptance of Information Technology: A Critical Review of Technology Acceptance Models and the Decision to Invest in Information Security | SpringerLink User Acceptance of Information Technology: A Critical Review of Technology Acceptance Models and the Decision to Invest in Information Security | SpringerLink](https://media.springernature.com/original/springer-static/image/chp%3A10.1007%2F978-3-319-51064-4_19/MediaObjects/437755_1_En_19_Fig14_HTML.gif)
User Acceptance of Information Technology: A Critical Review of Technology Acceptance Models and the Decision to Invest in Information Security | SpringerLink
![Enterprise data breach: causes, challenges, prevention, and future directions - Cheng - 2017 - WIREs Data Mining and Knowledge Discovery - Wiley Online Library Enterprise data breach: causes, challenges, prevention, and future directions - Cheng - 2017 - WIREs Data Mining and Knowledge Discovery - Wiley Online Library](https://onlinelibrary.wiley.com/cms/asset/f68fce80-1c81-4dce-95c9-6543e2855f8d/widm1211-toc-0001-m.jpg)
Enterprise data breach: causes, challenges, prevention, and future directions - Cheng - 2017 - WIREs Data Mining and Knowledge Discovery - Wiley Online Library
![Information Security Compliance in Organizations: An Institutional Perspective in: Data and Information Management Volume 1 Issue 2 (2017) Information Security Compliance in Organizations: An Institutional Perspective in: Data and Information Management Volume 1 Issue 2 (2017)](https://content.sciendo.com/view/journals/dim/1/2/graphic/j_dim-2017-0006_fig_001.jpg)