Understanding smartphone security behaviors: An extension of the protection motivation theory with anticipated regret.
Silas Formunyuy VerkijikaPublished in: Comput. Secur. (2018)
Keyphrases
- information security
- security architecture
- cognitive development
- security level
- security issues
- lower bound
- theoretical framework
- critical infrastructure
- security systems
- biometric data
- security protocols
- privacy protection
- intrusion detection
- security requirements
- expert advice
- data confidentiality
- protection scheme
- statistical databases
- daily life
- network security
- loss function
- worst case