Login / Signup
Compliance with security guidelines in teenagers: The conflicting role of peer influence and personal norms.
Florence Mwagwabi
Hee Jhee Jiow
Published in:
Australas. J. Inf. Syst. (2021)
Keyphrases
</>
role based access control
access control
information security
intrusion detection
role assignment
security policies
security threats
network security
security systems
security issues
security requirements
key management
computer security
privacy issues
security measures
user perceptions
information systems
sensitive data
biometric systems
personal information
peer to peer