Author: Dourish Paul Grinter Rebecca Delgado de la Flor Jessica Joseph Melissa
Publisher: Springer Publishing Company
ISSN: 1617-4909
Source: Personal and Ubiquitous Computing, Vol.8, Iss.6, 2004-11, pp. : 391-401
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Related content
Improving user security behaviour
By Leach J.
Computers and Security, Vol. 22, Iss. 8, 2003-12 ,pp. :
VINE, Vol. 36, Iss. 2, 2006-04 ,pp. :
Managing Information Security on a Shoestring Budget
Journal of Cases on Information Technology (JCIT), Vol. 5, Iss. 1, 2003-01 ,pp. :