Login / Signup

Using warning systems with adaptable thresholds: Choice of security level, compliance and performance in a simulated computer security task.

Rebecca WiczorekAnna Zirk
Published in: Int. J. Hum. Comput. Stud. (2019)
Keyphrases
  • computer security
  • security level
  • information security
  • computer systems
  • database
  • real time
  • information systems
  • network security
  • rule based systems
  • secret key