Behavioral Information Security: Two End User Survey Studies of Motivation and Security Practices.
Jeffrey M. StantonPaul MastrangeloKathryn R. StamJeffrey JoltonPublished in: AMCIS (2004)
Keyphrases
- information security
- end users
- security issues
- security level
- information assurance
- countermeasures
- smart card
- computer security
- intrusion detection
- security requirements
- information systems
- network security
- risk assessment
- user interface
- management practices
- application development
- web applications
- user driven
- smart grid
- business intelligence
- service providers
- privacy concerns
- iso iec
- information security management
- cyber defense
- risk analysis
- security risks
- case study
- e government
- theory of planned behavior
- data security
- data protection
- security threats
- sensitive data
- real world
- data mining