Login / Signup
How Secure is Your System? Examining the Influence of Technical, Managerial, and Educational Controls on Users' Secure Behavior.
Gray Ross
Jeffrey Jenkins
Published in:
AMCIS (2010)
Keyphrases
</>
security issues
security requirements
user privacy
information systems
user interface
access control
information sources
authentication protocol
access control mechanism
unauthorized access
e learning
multimedia
user interaction
lightweight
user generated content
identity management