Self-efficacy in information security: Its influence on end users' information security practice behavior.
Hyeun-Suk RheeCheong-Tag KimYoung U. RyuPublished in: Comput. Secur. (2009)
Keyphrases
- information security
- end users
- countermeasures
- security issues
- information systems
- network security
- intrusion detection
- smart card
- user interface
- application development
- information assurance
- web applications
- user requirements
- e government
- user experience
- risk assessment
- security level
- individual differences
- cyber defense
- service providers
- information security management
- user driven
- case study
- smart grid
- privacy concerns
- critical infrastructure
- security risks
- user friendliness
- real world
- data management
- decision support system