Login / Signup
Using warning systems with adaptable thresholds: Choice of security level, compliance and performance in a simulated computer security task.
Rebecca Wiczorek
Anna Zirk
Published in:
Int. J. Hum. Comput. Stud. (2019)
Keyphrases
</>
computer security
security level
information security
computer systems
database
real time
information systems
network security
rule based systems
secret key