Login / Signup

Examining the Neural Basis of Information Security Policy Violations: A Noninvasive Brain Stimulation Approach.

Ofir TurelQinghua HeYatong Wen
Published in: MIS Q. (2021)
Keyphrases
  • security policies
  • databases
  • human brain
  • neural network
  • log files
  • network architecture
  • security management
  • unauthorized access
  • computational neuroscience