Login / Signup
Circumvention of Security: Good Users Do Bad Things.
Jim Blythe
Ross Koppel
Sean W. Smith
Published in:
IEEE Secur. Priv. (2013)
Keyphrases
</>
end users
information sources
user interaction
privacy concerns
novice users
intrusion detection
information security
personal data
security and privacy issues
information systems
user experience
user satisfaction
information seeking
security requirements
security level
malicious users