Using phishing experiments and scenario-based surveys to understand security behaviours in practice.
Waldo Rocha FloresHannes HolmGustav SvenssonGöran EricssonPublished in: Inf. Manag. Comput. Secur. (2014)
Keyphrases
- identity theft
- information security
- computer security
- security issues
- countermeasures
- network security
- personal information
- intrusion detection
- information systems
- access control
- security policies
- security level
- statistical databases
- data collection
- security requirements
- cyber security
- data security
- security threats
- data mining
- malicious activities
- sensitive data
- end users