Sign in

Application of Routine Activity Theory to Cyber Intrusion Location and Time.

Kevin BockSydnee ShannonYazdan MovahediMichel Cukier
Published in: EDCC (2017)
Keyphrases
  • activity theory
  • information systems
  • artificial intelligence
  • case study
  • learning community