Understanding Nonmalicious Security Violations in the Workplace: A Composite Behavior Model.
Ken H. GuoYufei YuanNorman P. ArcherCatherine E. ConnellyPublished in: J. Manag. Inf. Syst. (2011)
Keyphrases
- neural network
- mathematical model
- computational model
- parameter estimation
- security model
- agent model
- computational models
- theoretical analysis
- probabilistic model
- objective function
- information systems
- input data
- em algorithm
- cost function
- database systems
- high level
- web services
- simulation model
- formal model
- risk assessment
- data sets