A Separate Phone to Work and Play: Protection Motivation Theory and Smartphone Security Behaviour.
Holly MasonKathryn ParsonsDragana CalicClemence DuePublished in: ACIS (2022)
Keyphrases
- information security
- security level
- security issues
- mobile devices
- data protection
- mobile phone
- cloud computing
- protection mechanisms
- security architecture
- information systems
- smart grid
- human operators
- game playing
- daily life
- theoretical framework
- computational model
- intrusion detection
- access control
- biometric systems
- security mechanisms
- data privacy
- critical infrastructure
- security model
- protection scheme
- biometric template