Author:
Parkin Simon,Chua Yi Ting
Publisher
Springer International Publishing
Reference74 articles.
1. Lecture Notes in Computer Science;A Acquisti,2006
2. Adorjan, M., Ricciardelli, R.: A new privacy paradox? Youth agentic practices of privacy management despite “nothing to hide” online. Can. Rev. Sociol. 56(1), 8–29 (2019)
3. Agrafiotis, I., et al.: Cyber harm: concepts, taxonomy and measurement. Saïd Business School WP 2016-23 (2016)
4. Ajzen, I., et al.: The theory of planned behavior. Organ. Behav. Hum. Decis. Processes 50(2), 179–211 (1991)
5. Alberts, C., Behrens, S., Pethia, R., Wilson, W.: Operationally critical threat, asset, and vulnerability evaluation (OCTAVE) framework, version 1.0. Technical report CMU/SEI-99-TR-017, Software Engineering Institute, Carnegie Mellon University (1999)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献