Security in the wild: user strategies for managing security as an everyday, practical problem.
Paul DourishRebecca E. GrinterJessica Delgado de la FlorMelissa JosephPublished in: Pers. Ubiquitous Comput. (2004)
Keyphrases
- intrusion detection
- information security
- network security
- security issues
- user authentication
- security requirements
- security policies
- statistical databases
- user friendliness
- database
- access control
- wide variety
- user interface
- digital rights management
- security management
- security problems
- security level
- security systems
- real world
- information assurance
- security threats
- security model
- authentication protocol
- cyber security
- security protocols
- key management
- sensitive data
- user interaction