Protective Measures and Security Policy Non-Compliance Intention: IT Vision Conflict as a Moderator.
Kuo-Chung ChangYoke May SeowPublished in: J. Organ. End User Comput. (2019)
Keyphrases
- security policies
- access control
- network security
- security management
- security requirements
- computer vision
- security architecture
- network management
- distributed systems
- vision system
- security concerns
- conflict resolution
- ubiquitous computing environments
- access control systems
- home network
- access control policies
- access control mechanism
- fine grained
- database
- user satisfaction
- computer networks
- machine learning