Login / Signup
Application of Protection Motivation Theory to Adoption of Protective Technologies.
Tim Chenoweth
Robert P. Minch
Tom Gattiker
Published in:
HICSS (2009)
Keyphrases
</>
information systems
data mining
computational model
key technologies
individual differences
information retrieval
control system
e government
theoretical framework