Author:
Chang Kuo-chung,Wang Chih-ping
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Information Systems,Theoretical Computer Science,Software
Reference77 articles.
1. Agarwal, R., & Karahann, E. (2000). Time flies when you’re having fun: cognitive absorption and beliefs about information technology usage. MIS Quarterly, 24(4), 665–694.
2. Anderson, J. M. (2003) Why we need a new definition of information security. Computers & Security, 22(4), 308–313.
3. Armstrong, J. S., & Overto, T. S. (1977). Estimating non-response bias in mail surveys. Journal of Marketing Research, 14(3), 396–402.
4. Armstrong, C. P., & Sambamurthy, V. (1999). Information technology assimilation in firms: the influence of senior leadership and IT infrastructures. Information Systems Research, 10(4), 304–327.
5. Bagchi, K., & Udo, G. (2003) An analysis of the growth of computer and internet security breaches. Communications of AIS, 12(46), 684–700.
Cited by
22 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献