Using susceptibility claims to motivate behaviour change in IT security.
Matthew L. JensenAlexandra DurcikovaRyan T. WrightPublished in: Eur. J. Inf. Syst. (2021)
Keyphrases
- information security
- access control
- network security
- security policies
- security issues
- information assurance
- security requirements
- intrusion detection
- statistical databases
- data security
- computer security
- security mechanisms
- security threats
- databases
- cyber attacks
- critical infrastructure
- data sets
- behave differently
- human operators
- countermeasures
- database systems
- website
- information systems