Analyzing the role of cognitive and User Behavior in the internalization of information security policies.
User Behavior application:
for suppose Login page:
Email id field
Reading the user behavior but not reading data
calculating user location:
From where the user data was opened with particular location like state area ip-address etc. Sending user a notification to (email or number) if user responds back that is not opened by user then immediately deactivate the credentials and providing the new password so here helping the user with more security.
So Here by using Google Analytics (or) Splunk for user behavior.
=> 15 Pages excludes Table of content, Reference
=> 15 Slides Power Point
APA format and should not go back farther than 5 years Summary of 5-8 articles