Compliance with security guidelines in teenagers: The conflicting role of peer influence and personal norms.
Florence MwagwabiHee Jhee JiowPublished in: Australas. J. Inf. Syst. (2021)
Keyphrases
- role based access control
- access control
- information security
- intrusion detection
- role assignment
- security policies
- security threats
- network security
- security systems
- security issues
- security requirements
- key management
- computer security
- privacy issues
- security measures
- user perceptions
- information systems
- sensitive data
- biometric systems
- personal information
- peer to peer