Login / Signup

Application of Protection Motivation Theory to Adoption of Protective Technologies.

Tim ChenowethRobert P. MinchTom Gattiker
Published in: HICSS (2009)
Keyphrases
  • information systems
  • data mining
  • computational model
  • key technologies
  • individual differences
  • information retrieval
  • control system
  • e government
  • theoretical framework