To download or not to download: an examination of computer security decision making.
Jefferson B. HardeeRyan WestChristopher B. MayhornPublished in: Interactions (2006)
Keyphrases
- computer security
- decision making
- anomaly detection
- intrusion detection
- network security
- computer systems
- information security
- information processing
- metadata
- supply chain
- information sharing
- decision makers
- decision support
- machine learning
- intrusion detection system
- supervised learning
- information technology
- pattern recognition
- reinforcement learning
- decision trees