A Protection Motivation Theory Approach to Home Wireless Security.
Irene WoonGek-Woo TanR. LowPublished in: ICIS (2005)
Keyphrases
- information security
- security level
- wireless communication
- security issues
- physical layer
- remote control
- theoretical framework
- critical infrastructure
- mobile devices
- wireless local area network
- security architecture
- information systems
- biometric template
- security protocols
- protection scheme
- internet access
- access control
- wireless networks
- mobile users
- data confidentiality
- sensor networks
- data protection
- security requirements
- wireless sensor
- security model
- statistical databases
- cyber security
- computer security
- wifi