Login / Signup
Why do People Adopt or Reject Smartphone Security Tools?
Nora Alkaldi
Karen Renaud
Published in:
HAISA (2016)
Keyphrases
</>
intrusion detection
information security
anomaly detection
cyber security
computer security
security vulnerabilities
data mining
end users
mobile devices
software tools
information assurance
security level
cyber attacks
security systems
encryption scheme
decision support
information systems