34
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: not found
      • Article: not found

      Individual Differences in Cyber Security Behaviors: An Examination of Who Is Sharing Passwords

      1 , 1 , 2 , 2
      Cyberpsychology, Behavior, and Social Networking
      Mary Ann Liebert Inc

      Read this article at

      ScienceOpenPublisher
      Bookmark
          There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Most cited references12

          • Record: found
          • Abstract: not found
          • Article: not found

          The digital divide shifts to differences in usage

            Bookmark
            • Record: found
            • Abstract: not found
            • Article: not found

            Analysis of end user security behaviors

              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Password Security: An Empirical Study

                Bookmark

                Author and article information

                Journal
                Cyberpsychology, Behavior, and Social Networking
                Cyberpsychology, Behavior, and Social Networking
                Mary Ann Liebert Inc
                2152-2715
                2152-2723
                January 2015
                January 2015
                : 18
                : 1
                : 3-7
                Affiliations
                [1 ]Department of Media and Communications, University of Leicester, Leicester, United Kingdom.
                [2 ]Cyber Security Centre, Department of Computer Science, University of Oxford, Oxford, United Kingdom.
                Article
                10.1089/cyber.2014.0179
                5b8f9781-28fd-4d2d-9b50-eb5031edf87a
                © 2015

                http://www.liebertpub.com/nv/resources-tools/text-and-data-mining-policy/121/

                History

                Comments

                Comment on this article