A comparative evaluation of behavioral security motives: Protection, intrinsic, and identity motivations.
Obi OgbanufeLing GePublished in: Comput. Secur. (2023)
Keyphrases
- comparative evaluation
- information security
- individual privacy
- security level
- critical infrastructure
- identity management
- security architecture
- network security
- security issues
- protection scheme
- intrusion detection
- biometric data
- personal information
- protection mechanisms
- security policies
- smart card
- biometric template
- security systems
- previously mentioned
- data confidentiality
- scoring methods
- computer security
- security requirements
- privacy protection
- cyber security
- statistical databases
- data protection
- page segmentation
- access control
- machine learning