File Download

There are no files associated with this item.

  Links for fulltext
     (May Require Subscription)
Supplementary

Article: The Classification of Hackers by Knowledge Exchange Behaviors

TitleThe Classification of Hackers by Knowledge Exchange Behaviors
Authors
Issue Date2015
PublisherSpringer New York LLC. The Journal's web site is located at http://springerlink.metapress.com/openurl.asp?genre=journal&issn=1387-3326
Citation
Information Systems Frontiers, 2015, v. 17 n. 6, p. 1239-1251 How to Cite?
Persistent Identifierhttp://hdl.handle.net/10722/232090
ISSN
2015 Impact Factor: 1.45
2015 SCImago Journal Rankings: 0.756

 

DC FieldValueLanguage
dc.contributor.authorZhang, X-
dc.contributor.authorTsang, A-
dc.contributor.authorYue, WT-
dc.contributor.authorChau, MCL-
dc.date.accessioned2016-09-20T05:27:39Z-
dc.date.available2016-09-20T05:27:39Z-
dc.date.issued2015-
dc.identifier.citationInformation Systems Frontiers, 2015, v. 17 n. 6, p. 1239-1251-
dc.identifier.issn1387-3326-
dc.identifier.urihttp://hdl.handle.net/10722/232090-
dc.languageeng-
dc.publisherSpringer New York LLC. The Journal's web site is located at http://springerlink.metapress.com/openurl.asp?genre=journal&issn=1387-3326-
dc.relation.ispartofInformation Systems Frontiers-
dc.rightsThe final publication is available at Springer via http://dx.doi.org/[insert DOI]-
dc.titleThe Classification of Hackers by Knowledge Exchange Behaviors-
dc.typeArticle-
dc.identifier.emailChau, MCL: mchau@business.hku.hk-
dc.identifier.authorityChau, MCL=rp01051-
dc.identifier.doi10.1007/s10796-015-9567-0-
dc.identifier.hkuros263315-
dc.identifier.volume17-
dc.identifier.issue6-
dc.identifier.spage1239-
dc.identifier.epage1251-
dc.publisher.placeUnited States-

Export via OAI-PMH Interface in XML Formats


OR


Export to Other Non-XML Formats