Modeling Security Policy and the Effect for End-Users.
Kevin D. JonesKizito SalakoPublished in: HCI (27) (2013)
Keyphrases
- end users
- security policies
- ubiquitous computing environments
- user interface
- access control
- user requirements
- web applications
- application development
- user experience
- security concerns
- network management
- security management
- network security
- user friendliness
- service providers
- distributed systems
- business intelligence
- user driven
- database
- security requirements
- decision makers
- information transfer
- metadata
- databases