Can Secure Behaviors Be Contagious? A Two-Stage Investigation of the Influence of Herd Behavior on Security Decisions.
Ali VedadiMerrill WarkentinPublished in: J. Assoc. Inf. Syst. (2020)
Keyphrases
- security issues
- security requirements
- human behavior
- personality traits
- security measures
- security level
- key management
- security management
- security mechanisms
- behavior patterns
- information security
- behavior analysis
- data security
- security protocols
- security model
- security analysis
- key exchange protocol
- data encryption
- human decision making
- security services
- stream cipher
- user authentication
- decision makers
- electronic voting
- sensitive data
- integrity verification
- diffie hellman
- authentication protocol
- access control
- behavioral model
- intrusion detection
- security properties
- malicious behavior
- behavioral models
- digital signature scheme
- identity management
- cryptographic protocols
- key exchange
- decision making
- previously mentioned
- public key encryption
- authentication mechanism
- trusted computing
- security architecture
- security policies
- public key
- computer security
- key distribution
- smart card
- secure multiparty computation
- real robot
- private key
- public key infrastructure
- authentication scheme
- rfid systems
- security patterns
- temporal behavior
- encryption scheme
- key agreement
- mobile agent system
- provably secure
- cloud computing