Funder
Walker College of Business, Appalachian State University
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Information Systems,Theoretical Computer Science,Software
Reference136 articles.
1. Aime, C., & Lioy. (2007). Dependability in wireless networks: Can we rely on Wifi? IEEE SECURITY & PRIVACY, 5, 23–29.
2. Anderson, & Agarwal. (2011). The digitization of healthcare: Boundary risks, emotion, and consumer willingness to disclose personal health information. Information Systems Research, 22(3), 469–490.
3. Arachchilage, & Love. (2013). A game design framework for avoiding phishing attacks. Computers in Human Behavior, 29(3), 706–714.
4. Arachchilage, & Love. (2014). Security awareness of computer users: A phishing threat avoidance perspective. Computers in Human Behavior, 38, 304–312.
5. Bachmann, M. (2010). The risk propensity and rationality of computer hackers. International Journal of Cyber Criminology, 4(1/2), 643–656.
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献