Examining the Boundary Effect of Information Systems Security Behavior Under Different Usage Purposes.
Ying LiTing PanNan (Andy) ZhangPublished in: IEEE Access (2019)
Keyphrases
- information systems
- information security
- information assurance
- information processing systems
- intrusion detection
- information technology
- network security
- access control
- computer security
- security policies
- computer systems
- security requirements
- databases
- security threats
- security level
- security mechanisms
- security issues
- project management
- human behavior
- object boundaries
- data security
- website
- security problems
- smart card
- mobile robot
- image segmentation