Cultivating an Atmosphere of Proactive Computer Security to Mitigate Limited End-User Awareness.
Martyn StylesTheodore TryfonasPublished in: HAISA (2008)
Keyphrases
- end users
- computer security
- anomaly detection
- network security
- information security
- intrusion detection
- application development
- computer systems
- user requirements
- user interface
- user experience
- network intrusion detection
- web applications
- intrusion detection system
- service providers
- user driven
- business intelligence
- user friendliness
- machine learning
- training data
- data processing
- knowledge management
- data streams
- case study
- ubiquitous computing environments
- knowledge base
- real world
- computer forensics