Login / Signup

Determining the antecedents of digital security practices in the general public dimension.

Tabitha L. JamesQuinton NottinghamByung Cho Kim
Published in: Inf. Technol. Manag. (2013)
Keyphrases
  • special case
  • closely related
  • case study
  • information security
  • information systems
  • e learning
  • access control
  • network security
  • security requirements
  • security systems
  • security problems
  • public key infrastructure