Understanding Bring Your Own Device (BYOD) and Employee Information Security Behaviors from A Work-Life Domain Perspective.
Mohamed AlaskarKathy Ning ShenPublished in: AMCIS (2016)
Keyphrases
- information security
- countermeasures
- computer security
- security issues
- intrusion detection
- network security
- information systems
- information security management
- smart card
- cyber defense
- e government
- web applications
- security level
- iso iec
- information assurance
- risk assessment
- privacy concerns
- dimensionality reduction
- risk analysis
- smart grid
- low cost
- software engineering
- databases