Contextual Difference and Intention to Perform Information Security Behaviours Against Malware in a BYOD Environment: a Protection Motivation Theory Approach.
Duy Pham Thien DangSiddhi PittayachawanMathews Zanda NkhomaPublished in: ACIS (2013)
Keyphrases
- information security
- countermeasures
- security issues
- intrusion detection
- critical infrastructure
- information systems
- smart card
- network security
- design theory
- computer security
- information security management
- security level
- cyber defense
- sensitive data
- privacy concerns
- risk assessment
- smart grid
- e government
- data protection
- security requirements
- intrusion detection system
- case study
- theory of planned behavior
- computer networks
- data analysis
- feature selection