Mobile device users’ privacy security assurance behavior A technology threat avoidance perspective
Saved in:
Published in | Information and computer security Vol. 25; no. 3; pp. 330 - 344 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
01.01.2017
|
Online Access | Get full text |
ISSN | 2056-4961 |
DOI | 10.1108/ICS-04-2016-0027 |
Cover
Author | Chen, Hao Li, Wenli |
---|---|
Author_xml | – sequence: 1 givenname: Hao surname: Chen fullname: Chen, Hao – sequence: 2 givenname: Wenli surname: Li fullname: Li, Wenli |
BookMark | eNp1z79OwzAQx3EPRaKU7ox5AcOd4zgOG6r4U6mIAZgt27kIo5AgO4nUjdfg9XgSUsGExHTLfX_S54Qtur4jxs4QzhFBX2w3jxwkF4CKA4hywZYCCsVlpfCYrVN6BQCsUOUKl-zyvnehpaymKXjKxkQxfX18Zu8xTNbvs0R-jGHYZzalMdpu_nH0YqfQx1N21Ng20fr3rtjzzfXT5o7vHm63m6sd90LmA3cloEZHNWKtrCrQuUIjaQ0Iea2c06IBEpVwspBQqtJC3SjrPJCWNal8xdTPro99SpEa48Ngh9B3Q7ShNQjmADcz3IA0B7g5wOcQ_oSz6s3G_f_JN7zyX5g |
CitedBy_id | crossref_primary_10_1007_s42979_022_01272_0 crossref_primary_10_1016_j_ijinfomgt_2021_102432 crossref_primary_10_1016_j_cose_2023_103429 crossref_primary_10_3390_jcp1040036 crossref_primary_10_1109_ACCESS_2019_2902905 crossref_primary_10_1108_IJBM_03_2024_0138 crossref_primary_10_1108_IJQRM_05_2022_0151 crossref_primary_10_1080_13683500_2022_2111297 crossref_primary_10_1016_j_cose_2020_101998 crossref_primary_10_1080_08874417_2019_1703225 crossref_primary_10_1080_10447318_2024_2390755 crossref_primary_10_1108_ICS_01_2020_0016 crossref_primary_10_1016_j_ijinfomgt_2019_05_010 crossref_primary_10_1108_ICS_10_2017_0073 crossref_primary_10_1016_j_jretconser_2019_05_004 crossref_primary_10_1080_23322039_2024_2330436 crossref_primary_10_1108_IJM_02_2021_0087 crossref_primary_10_1016_j_cose_2023_103470 crossref_primary_10_1016_j_dss_2025_114420 crossref_primary_10_1016_j_techfore_2022_122306 crossref_primary_10_1016_j_cose_2025_104365 crossref_primary_10_1155_2021_6232968 crossref_primary_10_1108_ICS_05_2023_0085 crossref_primary_10_1108_IMDS_07_2020_0420 crossref_primary_10_1080_10919392_2022_2028530 |
Cites_doi | 10.2307/25750690 10.2307/20650284 10.1080/15536548.2014.974429 10.1145/293411.293475 10.1057/ejis.2008.29 10.17705/1jais.00161 10.1111/j.1559-1816.2000.tb02323.x 10.1007/s10899-009-9149-5 10.17705/1jais.00133 10.2307/20650279 10.1016/j.dss.2010.07.009 10.1287/isre.1040.0032 10.1016/j.chb.2012.06.010 10.1016/j.dss.2008.11.010 10.1016/j.cose.2009.05.008 10.1002/dir.20009 10.1016/j.cose.2011.10.007 10.1348/014466603322595248 10.17705/1jais.00232 10.1002/ejsp.467 10.1016/j.cose.2012.11.004 10.1002/(SICI)1522-7138(199723)11:4<94::AID-DIR11>3.0.CO;2-F 10.1111/j.1559-1816.1996.tb01835.x 10.1504/IJMC.2009.022440 10.1016/j.dss.2009.02.005 10.2307/25148779 10.2307/25148854 10.2307/25750691 10.1007/11610496_100 10.1348/135910705X40997 10.1111/j.1559-1816.1999.tb02298.x 10.2307/249551 10.1016/j.im.2013.08.006 10.1111/j.1559-1816.2009.00558.x 10.1002/asi.20459 10.1108/09564230710778128 10.1002/(SICI)1099-0771(199906)12:2<93::AID-BDM311>3.0.CO;2-S |
ContentType | Journal Article |
DBID | AAYXX CITATION |
DOI | 10.1108/ICS-04-2016-0027 |
DatabaseName | CrossRef |
DatabaseTitle | CrossRef |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EndPage | 344 |
ExternalDocumentID | 10_1108_ICS_04_2016_0027 |
GroupedDBID | .WU 0-V 1WG 3FY 5VS 7WY 8AO 8FE 8FG 8FI 8FW 9F- AABYC AAGBP AAKOT AAMCF AAUDR AAXBI AAYXX ABIJV ABJNI ABSDC ABUWG ABXQL ABYQI ACGFS ACTSA ADBBV ADOMW ADQHX ADWNT AFKRA AFNTC AFRCI AFZLO AHMHQ AILOG AJEBP ALIPV ALMA_UNASSIGNED_HOLDINGS ALSLI AODMV AQUVI ARALO ARAPS AUCOK AZQEC BENPR BEZIV BGLVJ BGRYB BPHCQ BVXVI CCPQU CITATION CNYFK DWQXO EBS ECCUG EJD FNNZZ FYUFA GEA GEI GMX GNUQQ GQ. H13 HCIFZ K6V K6~ K7- KBGRL M0C M0O M0T M1O M42 P62 PHGZM PHGZT PJZUB PPXIY PQBIZ PQGLB PQQKQ PROAC PRQQA SCAQC SDURG SLOBJ TEM TGG TMF TMI TMT UKHRP Z11 Z12 Z21 ZYZAG |
ID | FETCH-LOGICAL-c243t-b70181bed11d6a651bb581e880103d6bb82f0e292b4540767a0df6abc0e84de63 |
IEDL.DBID | GEI |
ISSN | 2056-4961 |
IngestDate | Thu Apr 24 23:07:51 EDT 2025 Thu Jul 31 00:16:31 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 3 |
Language | English |
License | https://www.emerald.com/insight/site-policies |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c243t-b70181bed11d6a651bb581e880103d6bb82f0e292b4540767a0df6abc0e84de63 |
PageCount | 15 |
ParticipantIDs | crossref_citationtrail_10_1108_ICS_04_2016_0027 crossref_primary_10_1108_ICS_04_2016_0027 |
PublicationCentury | 2000 |
PublicationDate | 2017-01-01 |
PublicationDateYYYYMMDD | 2017-01-01 |
PublicationDate_xml | – month: 01 year: 2017 text: 2017-01-01 day: 01 |
PublicationDecade | 2010 |
PublicationTitle | Information and computer security |
PublicationYear | 2017 |
References | (key2020120619453285700_ref003) 2008; 38 (key2020120619453285700_ref030) 2009; 46 (key2020120619453285700_ref009) 2006; 10 (key2020120619453285700_ref023) 2014 (key2020120619453285700_ref052) 2005 key2020120619453285700_ref048 (key2020120619453285700_ref047) 2012; 49 (key2020120619453285700_ref057) 1999; 12 (key2020120619453285700_ref008) 2007; 42 (key2020120619453285700_ref041) 2008; 9 (key2020120619453285700_ref036) 2014 (key2020120619453285700_ref046) 2006; 6 (key2020120619453285700_ref040) 1999; 29 (key2020120619453285700_ref017) 2008; 17 (key2020120619453285700_ref053) 2008 (key2020120619453285700_ref004) 2007; 58 (key2020120619453285700_ref015) 2012; 31 (key2020120619453285700_ref024) 2009; 33 (key2020120619453285700_ref035) 1996; 26 (key2020120619453285700_ref016) 2010; 34 (key2020120619453285700_ref027) 2012 (key2020120619453285700_ref056) 2004 (key2020120619453285700_ref042) 2014; 51 (key2020120619453285700_ref038) 2009; 28 (key2020120619453285700_ref002) 2014; 70 (key2020120619453285700_ref055) 2009; 7 (key2020120619453285700_ref028) 2004; 18 (key2020120619453285700_ref019) 2005 (key2020120619453285700_ref044) 2008; 32 (key2020120619453285700_ref020) 2011; 50 (key2020120619453285700_ref013) 2009; 47 (key2020120619453285700_ref032) 2012; 28 (key2020120619453285700_ref049) 2009; 33 (key2020120619453285700_ref007) 2006; 11 (key2020120619453285700_ref033) 1997; 11 (key2020120619453285700_ref021) 2010 (key2020120619453285700_ref037) 2002 (key2020120619453285700_ref051) 2015 (key2020120619453285700_ref022) 2010; 26 (key2020120619453285700_ref029) 2013; 34 (key2020120619453285700_ref012) 2014; 10 (key2020120619453285700_ref045) 1998; 22 (key2020120619453285700_ref018) 2009 (key2020120619453285700_ref011) 2000; 30 (key2020120619453285700_ref010) 2007; 8 (key2020120619453285700_ref001) 2003; 42 (key2020120619453285700_ref025) 2010; 11 (key2020120619453285700_ref026) 2004; 15 (key2020120619453285700_ref054) 2012 (key2020120619453285700_ref050) 2007; 18 (key2020120619453285700_ref043) 2000 (key2020120619453285700_ref006) 1999; 42 key2020120619453285700_ref031 (key2020120619453285700_ref039) 2009; 39 (key2020120619453285700_ref034) 2006; 3842 (key2020120619453285700_ref005) 2010; 34 (key2020120619453285700_ref014) 2007; 31 |
References_xml | – volume: 70 start-page: 302 issue: 2 year: 2014 ident: key2020120619453285700_ref002 article-title: Mobile security: security mechanisms and protection of mobile applications publication-title: Journal of Theoretical and Applied Information Technology – volume: 34 start-page: 523 issue: 3 year: 2010 ident: key2020120619453285700_ref005 article-title: Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness publication-title: MIS Quarterly doi: 10.2307/25750690 – year: 2010 ident: key2020120619453285700_ref021 article-title: Understanding compliance with internet use policy: an integrative model based on command-and-control and self-regulatory approaches – volume: 33 start-page: 177 issue: 1 year: 2009 ident: key2020120619453285700_ref049 article-title: Using PLS path methoding for assessing hierarchical construct models: guidelines and empirical illustration publication-title: MIS Quarterly doi: 10.2307/20650284 – volume: 10 start-page: 186 issue: 4 year: 2014 ident: key2020120619453285700_ref012 article-title: Comparing the mobile device security behavior of college students and information technology professionals publication-title: Journal of Information Privacy and Security doi: 10.1080/15536548.2014.974429 – volume: 42 start-page: 60 issue: 2 year: 1999 ident: key2020120619453285700_ref006 article-title: Internet privacy concerns confirm the case for intervention publication-title: Communications of the ACM doi: 10.1145/293411.293475 – volume: 10 start-page: 7 issue: 2 year: 2006 ident: key2020120619453285700_ref009 article-title: Internet privacy concerns and social awareness as determinants of intention to transact publication-title: International Journal of Electronic Commerce – year: 2009 ident: key2020120619453285700_ref018 article-title: A privacy framework for mobile health and home-care systems – year: 2012 ident: key2020120619453285700_ref054 article-title: Measuring mobile users’ concerns for information privacy – volume: 17 start-page: 387 issue: 4 year: 2008 ident: key2020120619453285700_ref017 article-title: Personality traits and concern for privacy: an empirical study in the context of location-based services publication-title: European Journal of Information Systems doi: 10.1057/ejis.2008.29 – volume: 9 start-page: 344 issue: 6 year: 2008 ident: key2020120619453285700_ref041 article-title: An experimental study on ubiquitous commerce adoption: Impact of personalization and privacy concerns publication-title: Journal of the Association for Information Systems doi: 10.17705/1jais.00161 – volume: 30 start-page: 407 issue: 2 year: 2000 ident: key2020120619453285700_ref011 article-title: A meta-analysis of research on protection motivation theory publication-title: Journal of Applied Social Psychology doi: 10.1111/j.1559-1816.2000.tb02323.x – year: 2005 ident: key2020120619453285700_ref019 article-title: Why employees do non-work-related computing: an exploratory investigation through multiple theoretical perspectives – start-page: 181 year: 2014 ident: key2020120619453285700_ref036 article-title: Mobile malware security challeges and cloud-based detection – year: 2005 ident: key2020120619453285700_ref052 article-title: A protection motivation theory approach to home wireless security – volume: 26 start-page: 105 issue: 1 year: 2010 ident: key2020120619453285700_ref022 article-title: Anticipated regret, risk perception, or both: which is most likely responsible for our intention to gamble? publication-title: Journal of Gambling Studies doi: 10.1007/s10899-009-9149-5 – volume: 8 start-page: 386 issue: 7 year: 2007 ident: key2020120619453285700_ref010 article-title: The centrality of awareness in the formation of user behavioral intention toward protective information technologies publication-title: Journal of the Association for Information Systems doi: 10.17705/1jais.00133 – volume: 33 start-page: 71 issue: 1 year: 2009 ident: key2020120619453285700_ref024 article-title: Avoidance of information technology threats: a theoretical perspective publication-title: MIS Quarterly doi: 10.2307/20650279 – volume: 50 start-page: 361 issue: 2 year: 2011 ident: key2020120619453285700_ref020 article-title: Understanding anti-plagiarism software adoption: an extended protection motivation theory perspective publication-title: Decision Support Systems doi: 10.1016/j.dss.2010.07.009 – volume: 15 start-page: 336 issue: 4 year: 2004 ident: key2020120619453285700_ref026 article-title: Internet user’s information privacy concerns (IUIPC): the construct, the scale, and acausal model publication-title: Information Systems Research doi: 10.1287/isre.1040.0032 – volume: 28 start-page: 2067 issue: 6 year: 2012 ident: key2020120619453285700_ref032 article-title: Examining priming and gender as a means to reduce risk in a social networking context: can stories change disclosure and privacy setting use when personal profiles are constructed? publication-title: Computers in Human Behavior doi: 10.1016/j.chb.2012.06.010 – volume: 46 start-page: 815 issue: 4 year: 2009 ident: key2020120619453285700_ref030 article-title: Studying users’ computer security behavior: a health belief perspective publication-title: Decision Support Systems doi: 10.1016/j.dss.2008.11.010 – volume: 28 start-page: 816 issue: 8 year: 2009 ident: key2020120619453285700_ref038 article-title: Self-efficacy in information security: Its influence on end users’ information security practice behaviour publication-title: Computers & Security doi: 10.1016/j.cose.2009.05.008 – volume-title: Boundaries of Privacy: Dialectics of Disclosure year: 2002 ident: key2020120619453285700_ref037 – start-page: 260 year: 2015 ident: key2020120619453285700_ref051 article-title: Quantifying developers’ adoption of security tools – volume: 18 start-page: 15 issue: 3 year: 2004 ident: key2020120619453285700_ref028 article-title: Strategies for reducing online privacy risks: why consumers read (or don’t read) online privacy notices publication-title: Journal of Interactive Marketing doi: 10.1002/dir.20009 – volume: 31 start-page: 83 issue: 1 year: 2012 ident: key2020120619453285700_ref015 article-title: Understanding information systems security policy compliance: an integration of the theory of planned behavior and the protection motivation theory publication-title: Computers & Security doi: 10.1016/j.cose.2011.10.007 – volume: 42 start-page: 495 issue: 4 year: 2003 ident: key2020120619453285700_ref001 article-title: Acting on intentions: the role of anticipated regret publication-title: British Journal of Social Psychology doi: 10.1348/014466603322595248 – ident: key2020120619453285700_ref031 – volume: 11 start-page: 394 issue: 7 year: 2010 ident: key2020120619453285700_ref025 article-title: Understanding security behaviors in personal computer usage: a threat avoidance perspective publication-title: Journal of the Association for Information Systems doi: 10.17705/1jais.00232 – volume: 38 start-page: 685 issue: 4 year: 2008 ident: key2020120619453285700_ref003 article-title: Future-oriented emotions: conceptualization and behavioral effects publication-title: European Journal of Social Psychology doi: 10.1002/ejsp.467 – volume: 34 start-page: 47 year: 2013 ident: key2020120619453285700_ref029 article-title: Delegate the smartphone user? Security awareness in smartphone platforms publication-title: Computers & Security doi: 10.1016/j.cose.2012.11.004 – volume: 11 start-page: 94 issue: 4 year: 1997 ident: key2020120619453285700_ref033 article-title: Direct marketing and the use of individual-level consumer information: determining how and when ‘privacy’ matters publication-title: Journal of Direct Marketing doi: 10.1002/(SICI)1522-7138(199723)11:4<94::AID-DIR11>3.0.CO;2-F – start-page: 793 year: 2004 ident: key2020120619453285700_ref056 article-title: Alleviating consumers’ privacy concerns in location-based services: a psychological control perspective – volume: 26 start-page: 1 issue: 1 year: 1996 ident: key2020120619453285700_ref035 article-title: Modifying beliefs and attitudes to exceeding the speed limit: an intervention study based on the theory of planned behaviour publication-title: Journal of Applied Social Psychology doi: 10.1111/j.1559-1816.1996.tb01835.x – volume: 7 start-page: 154 issue: 2 year: 2009 ident: key2020120619453285700_ref055 article-title: Perceived effectiveness of text vs multimedia location-based advertising messaging publication-title: International Journal of Mobile Communications doi: 10.1504/IJMC.2009.022440 – volume: 47 start-page: 154 issue: 2 year: 2009 ident: key2020120619453285700_ref013 article-title: Encouraging information security behaviors in organizations: role of penalties, pressures and perceived effectiveness publication-title: Decision Support Systems doi: 10.1016/j.dss.2009.02.005 – volume: 31 start-page: 19 issue: 1 year: 2007 ident: key2020120619453285700_ref014 article-title: The value of privacy assurance: an exploratory field experiment publication-title: MIS Quarterly doi: 10.2307/25148779 – volume: 32 start-page: 503 issue: 3 year: 2008 ident: key2020120619453285700_ref044 article-title: Internet users’ information privacy-protective responses: a taxonomy and a nomological model publication-title: MIS Quarterly doi: 10.2307/25148854 – volume: 34 start-page: 549 issue: 3 year: 2010 ident: key2020120619453285700_ref016 article-title: Fear appeals and information security behaviors: an empirical study publication-title: MIS Quarterly doi: 10.2307/25750691 – volume: 3842 start-page: 741 year: 2006 ident: key2020120619453285700_ref034 article-title: WIPI mobile platform with secure service for mobile RFID network environment publication-title: Advanced Web and Network Technologies, and Applications doi: 10.1007/11610496_100 – volume: 11 start-page: 85 issue: 1 year: 2006 ident: key2020120619453285700_ref007 article-title: Role of anticipated regret, intentions and intention stability in adolescent smoking initiation publication-title: British Journal of Health Psychology doi: 10.1348/135910705X40997 – volume: 29 start-page: 2107 issue: 10 year: 1999 ident: key2020120619453285700_ref040 article-title: Augmenting the theory of planned behavior: roles for anticipated regret and descriptive norms publication-title: Journal of Applied Social Psychology doi: 10.1111/j.1559-1816.1999.tb02298.x – volume: 6 start-page: 156 issue: 9 year: 2006 ident: key2020120619453285700_ref046 article-title: An advanced mutual-authentication algorithm using AES for RFID systems publication-title: International Journal of Computer Science and Network Security – volume: 22 start-page: 441 issue: 4 year: 1998 ident: key2020120619453285700_ref045 article-title: Coping with systems risk: security planning models for management decision making publication-title: MIS Quarterly doi: 10.2307/249551 – volume: 51 start-page: 217 issue: 2 year: 2014 ident: key2020120619453285700_ref042 article-title: Employees’ adherence to information security policies: an exploratory field study publication-title: Information & Management doi: 10.1016/j.im.2013.08.006 – volume: 39 start-page: 2985 issue: 12 year: 2009 ident: key2020120619453285700_ref039 article-title: Expanding the affective and normative components of the theory of planned behavior: a meta-analysis of anticipated affect and moral norms publication-title: Journal of Applied Social Psychology doi: 10.1111/j.1559-1816.2009.00558.x – ident: key2020120619453285700_ref048 – start-page: 401 volume-title: Information Security for Global Information Infrastructures year: 2000 ident: key2020120619453285700_ref043 article-title: On the role of human morality in information system security – volume: 58 start-page: 157 issue: 2 year: 2007 ident: key2020120619453285700_ref004 article-title: Development of measures of online privacy concern and protection for use on the Internet publication-title: Journal of the American Society for Information Science and Technology doi: 10.1002/asi.20459 – start-page: 289 year: 2014 ident: key2020120619453285700_ref023 article-title: Smartphone: security and publication-title: privacy protection, Pervasive Computing and the Networked World – year: 2008 ident: key2020120619453285700_ref053 article-title: Examining the formation of individual’s privacy concerns: toward an integrative view – volume: 49 start-page: 190 issue: 3/4 year: 2012 ident: key2020120619453285700_ref047 article-title: Motivating IS security compliance: insights from habit and protection motivation theory publication-title: Information & Management – volume: 18 start-page: 326 issue: 4 year: 2007 ident: key2020120619453285700_ref050 article-title: Causes and consequences of consumer online privacy concern publication-title: International Journal of Service Industry Management doi: 10.1108/09564230710778128 – volume: 42 start-page: 84 issue: 2 year: 2007 ident: key2020120619453285700_ref008 article-title: Predicting binge-drinking behaviour using an extended TPB: examining the impact of anticipated regret and descriptive norms publication-title: Alcohol and Alcoholism – year: 2012 ident: key2020120619453285700_ref027 article-title: An integrative model of information security awareness for assessing information system security risk – volume: 12 start-page: 93 year: 1999 ident: key2020120619453285700_ref057 article-title: Anticipated regret, expected feedback and behavioral decision making publication-title: Journal of Behavioral Decision Making doi: 10.1002/(SICI)1099-0771(199906)12:2<93::AID-BDM311>3.0.CO;2-S |
SSID | ssj0001916361 |
Score | 2.263303 |
SourceID | crossref |
SourceType | Enrichment Source Index Database |
StartPage | 330 |
Subtitle | A technology threat avoidance perspective |
Title | Mobile device users’ privacy security assurance behavior |
Volume | 25 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1NT8IwGG4QL17Ez4gfpAcvHgZt15XNGyEimsBFSZDLsn4sEnEQGCZ68m_49_wltttKiNGDifd3S_emfd6PvX0eAM6xywQRmDmupNyhQSScSMOeg3ggBIrjgGQ8270-6w7o7dAblkDf3oXJxirzdkyG0-NkYYrUhhnc1ii8Ihww6jU37TvT19chTBfFpoY3HevGY_o82dA73WP26q_tuOhMyM0IVImO-npdDNv_lj-8bC1OrQWcTgVM7VLzOZOn-jLldfH2jcXx_75lB2wXuSls5ZtpF5RUsgcqVvcBFjCwDy57U67BBEplYAaaPsfi8_0Dzubjl0i8wkWhiQd1Yr40wh0KWjaAAzDoXN23u06hweAIQt3U4U3D6MWVxFiyiHmYc8_HSp96jFzJOPdJjBQJCM-o_FgzQjJmERdI-VQq5h6CcjJN1BGA2pY1ueSukAFlvjSllsIxjXyi3CbxqqBhPR6KgqDc6GRMwqxQQX6onRQiGhonhcZJVXCxemKWk3P8anv8B9sTsEVM9M46LaegnM6X6kznHimvZVuqBjZHD6PW9RfavNUx |
linkProvider | Emerald |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Mobile+device+users%E2%80%99+privacy+security+assurance+behavior&rft.jtitle=Information+and+computer+security&rft.au=Chen%2C+Hao&rft.au=Li%2C+Wenli&rft.date=2017-01-01&rft.issn=2056-4961&rft.volume=25&rft.issue=3&rft.spage=330&rft.epage=344&rft_id=info:doi/10.1108%2FICS-04-2016-0027&rft.externalDBID=n%2Fa&rft.externalDocID=10_1108_ICS_04_2016_0027 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2056-4961&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2056-4961&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2056-4961&client=summon |