Login / Signup
Application of Routine Activity Theory to Cyber Intrusion Location and Time.
Kevin Bock
Sydnee Shannon
Yazdan Movahedi
Michel Cukier
Published in:
EDCC (2017)
Keyphrases
</>
activity theory
information systems
artificial intelligence
case study
learning community