Sign in

Trust, privacy, and legal protection in the use of software with surreptitiously installed operations: An empirical evaluation.

Janice C. SipiorBurke T. Ward
Published in: Inf. Syst. Frontiers (2008)
Keyphrases