Investigating Employee Engagement in Nonmalicious, End-user Computing and Information Security Deviant Behavior.
Princely IfinedoPublished in: AMCIS (2019)
Keyphrases
- information security
- end user computing
- information systems
- countermeasures
- smart card
- network security
- information technology
- intrusion detection
- security issues
- information security management
- risk assessment
- security requirements
- smart grid
- iso iec
- information assurance
- security level
- risk analysis
- security risks
- technical issues
- cyber defense
- data model
- feature selection
- decision making
- data protection
- widely recognized
- databases
- high level
- database systems