Personality and IT security: An application of the five-factor model.
Jordan ShropshireMerrill WarkentinAllen C. JohnstonMark B. SchmidtPublished in: AMCIS (2006)
Keyphrases
- intrusion detection
- information security
- security requirements
- personality traits
- access control
- network security
- security policies
- security mechanisms
- security problems
- security issues
- security protocols
- security management
- security level
- security systems
- security model
- statistical databases
- computer security
- database systems
- social networks
- databases
- security threats
- database