Login / Signup
Are users competent to comply with information security policies? An analysis of professional competence models.
Aggeliki Tsohou
Philipp Holtkamp
Published in:
Inf. Technol. People (2018)
Keyphrases
</>
information sources
security policies
information seeking
information overload
machine learning
end users
access control
network security
privacy concerns
social media
user interaction
visualization tool
ubiquitous computing environments