BYOD Security: Using Dual Process Theory to Adapt Effective Security Habits in BYOD.
Roger ZhangAbubakar BelloJeffrey L. FosterPublished in: FTC (2) (2022)
Keyphrases
- access control
- information security
- network security
- security issues
- computer security
- intrusion detection
- security measures
- theoretical framework
- security policies
- security model
- security requirements
- security problems
- information assurance
- security threats
- security management
- functional requirements
- data security
- security protocols
- key management
- security mechanisms
- database systems
- statistical databases
- wireless sensor networks
- high quality