This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
March 2013 (vol. 46 no. 3)
pp. 124
David Alan Grier, George Washington University
In striving to build a secure information infrastructure, we're all trying to develop patterns of local behavior. The Web extra at http://youtu.be/lXk2QrOxEzI is a video segment in which author David Alan Grier expands on his Errant Hashtag column, in which he discusses how security policies provide guiding hands to help ensure cybersecurity.
Index Terms:
Information technology,Computer crime,Social factors,Information technology,Computer crime,Social factors,Network security,Computer security,Behavioral science,Information technology,Computer crime,Social factors,Network security,Computer security,Behavioral science,Information technology,Computer crime,Social factors,Network security,Computer security,Behavioral science,Information technology,Computer crime,Social factors,Network security,Computer security,Behavioral science,cybersecurity,Errant Hashtag,technology,computers and society
Citation:
David Alan Grier, "Attention to Context," Computer, vol. 46, no. 3, pp. 124, March 2013, doi:10.1109/MC.2013.81
Usage of this product signifies your acceptance of the Terms of Use.