File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Article: Development and validation of instruments of information security deviant behavior

TitleDevelopment and validation of instruments of information security deviant behavior
Authors
Issue Date21-Aug-2014
Citation
Decision Support Systems, 2014, v. 66, p. 93-101 How to Cite?
Persistent Identifierhttp://hdl.handle.net/10722/201027
ISI Accession Number ID

 

DC FieldValueLanguage
dc.contributor.authorChu, AMYen_US
dc.contributor.authorChau, PYKen_US
dc.date.accessioned2014-08-21T07:10:17Z-
dc.date.available2014-08-21T07:10:17Z-
dc.date.issued2014-08-21-
dc.identifier.citationDecision Support Systems, 2014, v. 66, p. 93-101en_US
dc.identifier.urihttp://hdl.handle.net/10722/201027-
dc.languageengen_US
dc.relation.ispartofDecision Support Systemsen_US
dc.titleDevelopment and validation of instruments of information security deviant behavioren_US
dc.typeArticleen_US
dc.identifier.emailChau, PYK: pchau@business.hku.hken_US
dc.identifier.authorityChau, PYK=rp01052en_US
dc.identifier.doi10.1016/j.dss.2014.06.008-
dc.identifier.scopuseid_2-s2.0-84908220241-
dc.identifier.hkuros233804en_US
dc.identifier.isiWOS:000344204800009-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats