Post Data Breach Use of Protective Technologies: An Examination of Users' Dilemma.
Emmanuel AyaburiFrancis Kofi Andoh-BaidooJae Ung LeePublished in: HICSS (2020)
Keyphrases
- data sets
- end users
- database
- data processing
- data points
- data collection
- visualization tools
- data sources
- data analysis
- data structure
- raw data
- data quality
- personal data
- website
- synthetic data
- collected data
- log data
- interactive exploration
- multimedia
- sensitive data
- original data
- missing data
- computer systems
- image data
- user interface