Using Phishing Experiments and Scenario-based Surveys to Understand Security Behaviours in Practice.
Waldo Rocha FloresHannes HolmGustav SvenssonGöran EricssonPublished in: EISMC (2013)
Keyphrases
- identity theft
- access control
- information security
- intrusion detection
- security policies
- countermeasures
- computer security
- human operators
- malicious activities
- security issues
- personal information
- network security
- statistical databases
- spam filtering
- security requirements
- key management
- security analysis
- data security
- security problems
- security architecture
- data collection
- data mining