The Assumptions and Profiles Behind IT Security Behavior.
Puzant BalozianDorothy E. LeidnerPublished in: HICSS (2017)
Keyphrases
- real time
- intrusion detection
- information security
- network security
- access control
- underlying assumptions
- data sets
- information assurance
- decision making
- security requirements
- security mechanisms
- computer security
- security systems
- security threats
- statistical databases
- security issues
- encryption scheme
- behavior analysis
- security properties
- user profiles