End User Security Training for Identification and Access Management.
Tonia San Nicolas-RoccaLorne OlfmanPublished in: J. Organ. End User Comput. (2013)
Keyphrases
- end users
- access control
- user friendliness
- role based access control
- application development
- user interface
- user requirements
- business users
- management tools
- network management
- management system
- security management
- security policies
- directory service
- user driven
- user experience
- web applications
- content providers
- training set
- information security
- intrusion detection
- information systems
- information management
- knowledge management
- search tools
- mobile applications
- data providers
- access requests
- ubiquitous computing environments
- business intelligence
- decision support
- decision making
- information access
- databases
- quality of service
- data processing
- data management
- end to end quality of service