Login / Signup
A framework for reporting and dealing with end-user security policy compliance.
Mutlaq Jalimid Alotaibi
Steven Furnell
Nathan L. Clarke
Published in:
Inf. Comput. Secur. (2019)
Keyphrases
</>
end users
security policies
application development
ubiquitous computing environments
business intelligence
user requirements
data analysis
user interface
user driven
data mining
database systems
digital libraries
mobile devices
data model
access control
user friendliness