Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference46 articles.
1. Ajzen I, Fishbein M (1980) Understanding attitudes and predicting social behavior. Prentice-Hall, Englewood Cliffs
2. Allam S, Flowerday SV, Flowerday E (2014) Smartphone information security awareness: a victim of operational pressures. Comput Sec 42:56–65.
https://doi.org/10.1016/j.cose.2014.01.005
3. Ben-Asher N, Sieger H, Ben-Oved A, Kirschnick N, Meyer J, Moller S (2011). On the need for different security methods on mobile phones. In Proc. of MobileHCI’2011, Stockholm, Sweden
4. Benbasat I, Barki H (2007) Quo vadis, TAM? J Assoc Inf Syst 8(4):211–218
5. Biddle R, Chiasson S, van Oorschot PC (2012) Graphical passwords: learning from the first twelve years. ACM Comput Surv 44(4):1–41.
https://doi.org/10.1145/2333112.2333114
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献