8
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: not found
      • Article: not found

      Factors in an end user security expertise instrument

      , , ,
      Information and Computer Security
      Emerald

      Read this article at

      ScienceOpenPublisher
      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Most cited references28

          • Record: found
          • Abstract: not found
          • Book: not found

          Human Error

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Internet Users' Information Privacy Concerns (IUIPC): The Construct, the Scale, and a Causal Model

              Bookmark
              • Record: found
              • Abstract: not found
              • Book: not found

              Scaling Procedures

                Bookmark

                Author and article information

                Journal
                Information and Computer Security
                Info and Computer Security
                Emerald
                2056-4961
                June 12 2017
                June 12 2017
                : 25
                : 2
                : 190-205
                Article
                10.1108/ICS-04-2017-0020
                2a3b2cc3-9573-424a-adc0-8bf2069f081a
                © 2017

                http://www.emeraldinsight.com/page/tdm

                History

                Comments

                Comment on this article