Login / Signup
Understanding User's Behavior and Protection Strategy upon Losing, or Identifying Unauthorized Access to Online Account.
Huzeyfe Kocabas
Swapnil Nandy
Tanjina Tamanna
Mahdi Nasrullah Al-Ameen
Published in:
HCI (27) (2021)
Keyphrases
</>
unauthorized access
internet users
access control
end users
online learning
security policies
database
data sets
user interface
user interaction
databases
data mining
data structure
recommender systems
data management
online services