Computer Security and Risky Computing Practices: A Rational Choice Perspective.
Kregg AytesTerry ConnollyPublished in: J. Organ. End User Comput. (2004)
Keyphrases
- computer security
- intrusion detection
- anomaly detection
- information security
- computer systems
- network security
- decision making
- network intrusion detection
- case study
- multiple perspectives
- data processing
- data analysis
- intrusion detection system
- network traffic
- smart card
- object recognition
- pattern recognition
- information systems