Login / Signup
How different rewards tend to influence employee non-compliance with information security policies.
Rima El-Khatib
Henri Barki
Published in:
Inf. Comput. Secur. (2022)
Keyphrases
</>
security policies
access control
data mining
data analysis
data model
home network