The IT Security Adoption Conundrum: An Initial Step Toward Validation of Applicable Measures.
Merrill WarkentinJordan ShropshireAllen C. JohnstonPublished in: AMCIS (2007)
Keyphrases
- user friendliness
- intrusion detection
- information security
- security policies
- security requirements
- security systems
- iterative process
- security issues
- computer security
- information technology
- information systems
- neural network
- statistical databases
- post processing
- e government
- authentication protocol
- security problems
- quantitative measures
- security management