Author:
Zhang Xiong,Tsang Alex,Yue Wei T.,Chau Michael
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Information Systems,Theoretical Computer Science,Software
Reference37 articles.
1. Abbasi, A., et al. (2010). Detecting fake websites: the contribution of statistical learning theory. MIS Quarterly, 34(3), 1–28.
2. Abuhamdieh, A. (2006). Knowledge transfer in virtual communities. Review of Business Information Systems, 10(4), 23–36.
3. Albanesius, C. (2011). Cyber crime costs $114B per year, mobile attacks on the rise. Retrieved August 2013, from http://www.pcmag.com/article2/0,2817,2392570,00.asp .
4. Barber, R. (2001). Hackers profiled – who are they and what are their motivations. Computer Fraud & Security, 2001(2), 14–17.
5. Bock, G.-W., Zmud, R. W., Kim, Y.-G., & Lee, J.-N. (2005). Behavioral intention formation in knowledge sharing: examining the roles of extrinsic motivators, social-psychological forces, and organizational climate. MIS Quarterly, 29(1), 87–111.
Cited by
34 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献