Neural Correlates of Protection Motivation for Secure IT Behaviors: An fMRI Examination.
Merrill WarkentinEric A. WaldenAllen C. JohnstonDetmar W. StraubPublished in: J. Assoc. Inf. Syst. (2016)
Keyphrases
- security level
- security architecture
- previously mentioned
- data protection
- cognitive states
- neural network
- protection scheme
- network architecture
- data analysis
- human brain
- information security
- neural model
- human behavior
- activation detection
- access control
- functional connectivity
- protection mechanisms
- security requirements
- security mechanisms
- functional magnetic resonance imaging
- data confidentiality
- cryptographic protocols
- computational intelligence
- event related
- biologically inspired
- associative memory
- security issues
- security policies