Author:
Jeske Debora,Briggs Pam,Coventry Lynne
Publisher
Springer Science and Business Media LLC
Subject
Management Science and Operations Research,Computer Science Applications,Hardware and Architecture
Reference70 articles.
1. Almuhimedi H, Schaub F, Sadeh N, Adjerid I, Acquisti A, Gluck J, Cranor L, Agarwal Y (2015) Your location has been shared 5398 times!: a field study on mobile app privacy nudging. In: Proceedings of the 33rd annual ACM conference on human factors in computing systems (pp 787–796). ACM
2. Barratt ES (1985) Impulsiveness subtraits: arousal and information processing. In: Spence JT, Izard CE (eds) Motivation, emotion, and personality. Elsevier, North Holland, pp 137–146
3. Beautement A, Sasse MA, Wonham M (2008) The compliance budget: managing security behaviour in organisations. In: New security paradigms: proceedings of the 2008 workshop (NSPW), pp 47–58. doi: 10.1145/1595676.1595684
4. Berkowsky RW (2013) When you just cannot get away. Inform Commun Soc 16(4):519–541. doi: 10.1080/1369118X.2013.772650
5. Billieux J, Van Der Linden M (2012) Problematic use of the internet and self-regulation: a review of the initial studies. Open Addict J 5(1:M4):24–29. doi: 10.2174/1874941001205010024
Cited by
22 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献