Security Policy Opt-in Decisions in Bring-Your-Own-Device (BYOD) - A Persuasion and Cognitive Elaboration Perspective.
Xue YangXinwei WangWei Thoo YueChoon Ling SiaXin Robert LuoPublished in: J. Organ. Comput. Electron. Commer. (2019)
Keyphrases
- security policies
- access control
- decision making
- home network
- network security
- security management
- security requirements
- security concerns
- distributed systems
- network management
- access control systems
- web applications
- security architecture
- access control policies
- ubiquitous computing environments
- easy to follow
- security measures
- access control mechanism
- data mining
- cognitive science
- fine grained
- network access