Understanding the violation of IS security policy in organizations: An integrated model based on social control and deterrence theory

- Cheng, Lijiao, Li, Ying, Li, Wenli, Holm, Eric, Zhai, Qingguo