![Information Security Compliance in Organizations: An Institutional Perspective in: Data and Information Management Volume 1 Issue 2 (2017) Information Security Compliance in Organizations: An Institutional Perspective in: Data and Information Management Volume 1 Issue 2 (2017)](https://content.sciendo.com/view/journals/dim/1/2/graphic/j_dim-2017-0006_fig_006.jpg)
Information Security Compliance in Organizations: An Institutional Perspective in: Data and Information Management Volume 1 Issue 2 (2017)
1] E. Alata, M. Dacier, Y. Deswarte, M. Kaaâniche, K. Kortchinsky, V. Nicomette, V. H. Pham, and F. Pouget. Collection and ana
![Information Security Compliance in Organizations: An Institutional Perspective in: Data and Information Management Volume 1 Issue 2 (2017) Information Security Compliance in Organizations: An Institutional Perspective in: Data and Information Management Volume 1 Issue 2 (2017)](https://content.sciendo.com/view/journals/dim/1/2/graphic/j_dim-2017-0006_fig_001.jpg)
Information Security Compliance in Organizations: An Institutional Perspective in: Data and Information Management Volume 1 Issue 2 (2017)
![User Acceptance of Information Technology: A Critical Review of Technology Acceptance Models and the Decision to Invest in Information Security | SpringerLink User Acceptance of Information Technology: A Critical Review of Technology Acceptance Models and the Decision to Invest in Information Security | SpringerLink](https://media.springernature.com/original/springer-static/image/chp%3A10.1007%2F978-3-319-51064-4_19/MediaObjects/437755_1_En_19_Fig14_HTML.gif)
User Acceptance of Information Technology: A Critical Review of Technology Acceptance Models and the Decision to Invest in Information Security | SpringerLink
![Enterprise data breach: causes, challenges, prevention, and future directions - Cheng - 2017 - WIREs Data Mining and Knowledge Discovery - Wiley Online Library Enterprise data breach: causes, challenges, prevention, and future directions - Cheng - 2017 - WIREs Data Mining and Knowledge Discovery - Wiley Online Library](https://onlinelibrary.wiley.com/cms/asset/10b8a4df-c3eb-41ae-b3ee-4d5fc8551762/widm1211-fig-0006-m.jpg)
Enterprise data breach: causes, challenges, prevention, and future directions - Cheng - 2017 - WIREs Data Mining and Knowledge Discovery - Wiley Online Library
![Week 5: Cryptography: 3.2 Digital signatures and certificates - OpenLearn - Open University - CYBER_B1 Week 5: Cryptography: 3.2 Digital signatures and certificates - OpenLearn - Open University - CYBER_B1](https://www.open.edu/openlearn/ocw/pluginfile.php/697247/mod_oucontent/oucontent/34284/e1d42cc2/f558174e/ou_futurelearn_cyber_security_fig_1177.tif.jpg)