Login / Signup

How different rewards tend to influence employee non-compliance with information security policies.

Rima El-KhatibHenri Barki
Published in: Inf. Comput. Secur. (2022)
Keyphrases
  • security policies
  • access control
  • data mining
  • data analysis
  • data model
  • home network