Empowerment or Control: Reconsidering Employee Security Policy Compliance in Terms of Authorization.
Soohyun JeonAnat HovavPublished in: HICSS (2015)
Keyphrases
- security policies
- access control
- security management
- network security
- security requirements
- fine grained
- network management
- distributed systems
- access control mechanism
- security architecture
- access control systems
- security concerns
- access control policies
- control system
- conflict resolution
- security measures
- knowledge discovery
- event logs
- distributed environment
- data mining
- unauthorized access