Login / Signup
Examining the Neural Basis of Information Security Policy Violations: A Noninvasive Brain Stimulation Approach.
Ofir Turel
Qinghua He
Yatong Wen
Published in:
MIS Q. (2021)
Keyphrases
</>
security policies
databases
human brain
neural network
log files
network architecture
security management
unauthorized access
computational neuroscience