End user nonmalicious, counterproductive computer security behaviors: concept, development, and validation of an instrument.
Princely IfinedoPublished in: Secur. Priv. (2019)
Keyphrases
- end users
- computer security
- user friendliness
- computer forensics
- application development
- user interface
- web applications
- computer systems
- user requirements
- information security
- anomaly detection
- case study
- software engineering
- business intelligence
- user driven
- network intrusion detection
- user experience
- network security
- intrusion detection system
- development process
- database
- intrusion detection
- computer networks
- decision support
- ubiquitous computing environments
- data management
- social networks
- databases