theassumptionsandprofiles-2017.pdf (1.17 MB)
The assumptions and profiles behind IT security behavior
conference contribution
posted on 2017-01-01, 00:00 authored by P Balozian, Dorothy LeidnerDorothy LeidnerThe assumptions and profiles behind IT security behavior