Login / Signup
Toward an experimental methodology for studying persuasion-based online security.
Michael Nowak
Shailendra Rao
Clifford Nass
Joel Lewenstein
Andrew Meyer
Jessica Richman
Published in:
CHI Extended Abstracts (2009)
Keyphrases
</>
online learning
security issues
information security
computer security
security properties
network security
statistical databases
neural network
security systems
key management
security mechanisms
access control
security requirements
security policies
security level
real time
security problems