Publisher
Springer Science and Business Media LLC
Subject
Human-Computer Interaction,Economics, Econometrics and Finance (miscellaneous)
Reference33 articles.
1. Tsohoua, A., Kokolakis, S., Karyda, M., & Kiountouzis, E. (2008). Investigating information security awareness: Research and practice gaps. Information Security Journal: A Global Perspective, 17(5–6), 207–227.
2. Taylor, D. G., Davis, D. F., & Jillapalli, R. (2009). Privacy concern and online personalization: The moderating effects of information control and compensation. Electronic Commerce Research, 9(3), 203–223.
3. ISO/IEC 27002:2005 (2005). Information technology Security techniques Code of practice for information security management.
4. Jahyun Goo, C., & Huang, D. (2008). Facilitating relational governance through service level agreements in IT outsourcing: An application of the commitment-trust theory. Decision Support Systems, 46(1), 216–232.
5. Kaufman, J. H., Edlund, S., Ford, D. A., & Powers, C. (2005). The social contract core. Electronic Commerce Research, 5(1), 141–165.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献