Mobile device users’ privacy security assurance behavior A technology threat avoidance perspective

Saved in:
Bibliographic Details
Published inInformation and computer security Vol. 25; no. 3; pp. 330 - 344
Main Authors Chen, Hao, Li, Wenli
Format Journal Article
LanguageEnglish
Published 01.01.2017
Online AccessGet full text
ISSN2056-4961
DOI10.1108/ICS-04-2016-0027

Cover

Author Chen, Hao
Li, Wenli
Author_xml – sequence: 1
  givenname: Hao
  surname: Chen
  fullname: Chen, Hao
– sequence: 2
  givenname: Wenli
  surname: Li
  fullname: Li, Wenli
BookMark eNp1z79OwzAQx3EPRaKU7ox5AcOd4zgOG6r4U6mIAZgt27kIo5AgO4nUjdfg9XgSUsGExHTLfX_S54Qtur4jxs4QzhFBX2w3jxwkF4CKA4hywZYCCsVlpfCYrVN6BQCsUOUKl-zyvnehpaymKXjKxkQxfX18Zu8xTNbvs0R-jGHYZzalMdpu_nH0YqfQx1N21Ng20fr3rtjzzfXT5o7vHm63m6sd90LmA3cloEZHNWKtrCrQuUIjaQ0Iea2c06IBEpVwspBQqtJC3SjrPJCWNal8xdTPro99SpEa48Ngh9B3Q7ShNQjmADcz3IA0B7g5wOcQ_oSz6s3G_f_JN7zyX5g
CitedBy_id crossref_primary_10_1007_s42979_022_01272_0
crossref_primary_10_1016_j_ijinfomgt_2021_102432
crossref_primary_10_1016_j_cose_2023_103429
crossref_primary_10_3390_jcp1040036
crossref_primary_10_1109_ACCESS_2019_2902905
crossref_primary_10_1108_IJBM_03_2024_0138
crossref_primary_10_1108_IJQRM_05_2022_0151
crossref_primary_10_1080_13683500_2022_2111297
crossref_primary_10_1016_j_cose_2020_101998
crossref_primary_10_1080_08874417_2019_1703225
crossref_primary_10_1080_10447318_2024_2390755
crossref_primary_10_1108_ICS_01_2020_0016
crossref_primary_10_1016_j_ijinfomgt_2019_05_010
crossref_primary_10_1108_ICS_10_2017_0073
crossref_primary_10_1016_j_jretconser_2019_05_004
crossref_primary_10_1080_23322039_2024_2330436
crossref_primary_10_1108_IJM_02_2021_0087
crossref_primary_10_1016_j_cose_2023_103470
crossref_primary_10_1016_j_dss_2025_114420
crossref_primary_10_1016_j_techfore_2022_122306
crossref_primary_10_1016_j_cose_2025_104365
crossref_primary_10_1155_2021_6232968
crossref_primary_10_1108_ICS_05_2023_0085
crossref_primary_10_1108_IMDS_07_2020_0420
crossref_primary_10_1080_10919392_2022_2028530
Cites_doi 10.2307/25750690
10.2307/20650284
10.1080/15536548.2014.974429
10.1145/293411.293475
10.1057/ejis.2008.29
10.17705/1jais.00161
10.1111/j.1559-1816.2000.tb02323.x
10.1007/s10899-009-9149-5
10.17705/1jais.00133
10.2307/20650279
10.1016/j.dss.2010.07.009
10.1287/isre.1040.0032
10.1016/j.chb.2012.06.010
10.1016/j.dss.2008.11.010
10.1016/j.cose.2009.05.008
10.1002/dir.20009
10.1016/j.cose.2011.10.007
10.1348/014466603322595248
10.17705/1jais.00232
10.1002/ejsp.467
10.1016/j.cose.2012.11.004
10.1002/(SICI)1522-7138(199723)11:4<94::AID-DIR11>3.0.CO;2-F
10.1111/j.1559-1816.1996.tb01835.x
10.1504/IJMC.2009.022440
10.1016/j.dss.2009.02.005
10.2307/25148779
10.2307/25148854
10.2307/25750691
10.1007/11610496_100
10.1348/135910705X40997
10.1111/j.1559-1816.1999.tb02298.x
10.2307/249551
10.1016/j.im.2013.08.006
10.1111/j.1559-1816.2009.00558.x
10.1002/asi.20459
10.1108/09564230710778128
10.1002/(SICI)1099-0771(199906)12:2<93::AID-BDM311>3.0.CO;2-S
ContentType Journal Article
DBID AAYXX
CITATION
DOI 10.1108/ICS-04-2016-0027
DatabaseName CrossRef
DatabaseTitle CrossRef
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EndPage 344
ExternalDocumentID 10_1108_ICS_04_2016_0027
GroupedDBID .WU
0-V
1WG
3FY
5VS
7WY
8AO
8FE
8FG
8FI
8FW
9F-
AABYC
AAGBP
AAKOT
AAMCF
AAUDR
AAXBI
AAYXX
ABIJV
ABJNI
ABSDC
ABUWG
ABXQL
ABYQI
ACGFS
ACTSA
ADBBV
ADOMW
ADQHX
ADWNT
AFKRA
AFNTC
AFRCI
AFZLO
AHMHQ
AILOG
AJEBP
ALIPV
ALMA_UNASSIGNED_HOLDINGS
ALSLI
AODMV
AQUVI
ARALO
ARAPS
AUCOK
AZQEC
BENPR
BEZIV
BGLVJ
BGRYB
BPHCQ
BVXVI
CCPQU
CITATION
CNYFK
DWQXO
EBS
ECCUG
EJD
FNNZZ
FYUFA
GEA
GEI
GMX
GNUQQ
GQ.
H13
HCIFZ
K6V
K6~
K7-
KBGRL
M0C
M0O
M0T
M1O
M42
P62
PHGZM
PHGZT
PJZUB
PPXIY
PQBIZ
PQGLB
PQQKQ
PROAC
PRQQA
SCAQC
SDURG
SLOBJ
TEM
TGG
TMF
TMI
TMT
UKHRP
Z11
Z12
Z21
ZYZAG
ID FETCH-LOGICAL-c243t-b70181bed11d6a651bb581e880103d6bb82f0e292b4540767a0df6abc0e84de63
IEDL.DBID GEI
ISSN 2056-4961
IngestDate Thu Apr 24 23:07:51 EDT 2025
Thu Jul 31 00:16:31 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 3
Language English
License https://www.emerald.com/insight/site-policies
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c243t-b70181bed11d6a651bb581e880103d6bb82f0e292b4540767a0df6abc0e84de63
PageCount 15
ParticipantIDs crossref_citationtrail_10_1108_ICS_04_2016_0027
crossref_primary_10_1108_ICS_04_2016_0027
PublicationCentury 2000
PublicationDate 2017-01-01
PublicationDateYYYYMMDD 2017-01-01
PublicationDate_xml – month: 01
  year: 2017
  text: 2017-01-01
  day: 01
PublicationDecade 2010
PublicationTitle Information and computer security
PublicationYear 2017
References (key2020120619453285700_ref003) 2008; 38
(key2020120619453285700_ref030) 2009; 46
(key2020120619453285700_ref009) 2006; 10
(key2020120619453285700_ref023) 2014
(key2020120619453285700_ref052) 2005
key2020120619453285700_ref048
(key2020120619453285700_ref047) 2012; 49
(key2020120619453285700_ref057) 1999; 12
(key2020120619453285700_ref008) 2007; 42
(key2020120619453285700_ref041) 2008; 9
(key2020120619453285700_ref036) 2014
(key2020120619453285700_ref046) 2006; 6
(key2020120619453285700_ref040) 1999; 29
(key2020120619453285700_ref017) 2008; 17
(key2020120619453285700_ref053) 2008
(key2020120619453285700_ref004) 2007; 58
(key2020120619453285700_ref015) 2012; 31
(key2020120619453285700_ref024) 2009; 33
(key2020120619453285700_ref035) 1996; 26
(key2020120619453285700_ref016) 2010; 34
(key2020120619453285700_ref027) 2012
(key2020120619453285700_ref056) 2004
(key2020120619453285700_ref042) 2014; 51
(key2020120619453285700_ref038) 2009; 28
(key2020120619453285700_ref002) 2014; 70
(key2020120619453285700_ref055) 2009; 7
(key2020120619453285700_ref028) 2004; 18
(key2020120619453285700_ref019) 2005
(key2020120619453285700_ref044) 2008; 32
(key2020120619453285700_ref020) 2011; 50
(key2020120619453285700_ref013) 2009; 47
(key2020120619453285700_ref032) 2012; 28
(key2020120619453285700_ref049) 2009; 33
(key2020120619453285700_ref007) 2006; 11
(key2020120619453285700_ref033) 1997; 11
(key2020120619453285700_ref021) 2010
(key2020120619453285700_ref037) 2002
(key2020120619453285700_ref051) 2015
(key2020120619453285700_ref022) 2010; 26
(key2020120619453285700_ref029) 2013; 34
(key2020120619453285700_ref012) 2014; 10
(key2020120619453285700_ref045) 1998; 22
(key2020120619453285700_ref018) 2009
(key2020120619453285700_ref011) 2000; 30
(key2020120619453285700_ref010) 2007; 8
(key2020120619453285700_ref001) 2003; 42
(key2020120619453285700_ref025) 2010; 11
(key2020120619453285700_ref026) 2004; 15
(key2020120619453285700_ref054) 2012
(key2020120619453285700_ref050) 2007; 18
(key2020120619453285700_ref043) 2000
(key2020120619453285700_ref006) 1999; 42
key2020120619453285700_ref031
(key2020120619453285700_ref039) 2009; 39
(key2020120619453285700_ref034) 2006; 3842
(key2020120619453285700_ref005) 2010; 34
(key2020120619453285700_ref014) 2007; 31
References_xml – volume: 70
  start-page: 302
  issue: 2
  year: 2014
  ident: key2020120619453285700_ref002
  article-title: Mobile security: security mechanisms and protection of mobile applications
  publication-title: Journal of Theoretical and Applied Information Technology
– volume: 34
  start-page: 523
  issue: 3
  year: 2010
  ident: key2020120619453285700_ref005
  article-title: Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness
  publication-title: MIS Quarterly
  doi: 10.2307/25750690
– year: 2010
  ident: key2020120619453285700_ref021
  article-title: Understanding compliance with internet use policy: an integrative model based on command-and-control and self-regulatory approaches
– volume: 33
  start-page: 177
  issue: 1
  year: 2009
  ident: key2020120619453285700_ref049
  article-title: Using PLS path methoding for assessing hierarchical construct models: guidelines and empirical illustration
  publication-title: MIS Quarterly
  doi: 10.2307/20650284
– volume: 10
  start-page: 186
  issue: 4
  year: 2014
  ident: key2020120619453285700_ref012
  article-title: Comparing the mobile device security behavior of college students and information technology professionals
  publication-title: Journal of Information Privacy and Security
  doi: 10.1080/15536548.2014.974429
– volume: 42
  start-page: 60
  issue: 2
  year: 1999
  ident: key2020120619453285700_ref006
  article-title: Internet privacy concerns confirm the case for intervention
  publication-title: Communications of the ACM
  doi: 10.1145/293411.293475
– volume: 10
  start-page: 7
  issue: 2
  year: 2006
  ident: key2020120619453285700_ref009
  article-title: Internet privacy concerns and social awareness as determinants of intention to transact
  publication-title: International Journal of Electronic Commerce
– year: 2009
  ident: key2020120619453285700_ref018
  article-title: A privacy framework for mobile health and home-care systems
– year: 2012
  ident: key2020120619453285700_ref054
  article-title: Measuring mobile users’ concerns for information privacy
– volume: 17
  start-page: 387
  issue: 4
  year: 2008
  ident: key2020120619453285700_ref017
  article-title: Personality traits and concern for privacy: an empirical study in the context of location-based services
  publication-title: European Journal of Information Systems
  doi: 10.1057/ejis.2008.29
– volume: 9
  start-page: 344
  issue: 6
  year: 2008
  ident: key2020120619453285700_ref041
  article-title: An experimental study on ubiquitous commerce adoption: Impact of personalization and privacy concerns
  publication-title: Journal of the Association for Information Systems
  doi: 10.17705/1jais.00161
– volume: 30
  start-page: 407
  issue: 2
  year: 2000
  ident: key2020120619453285700_ref011
  article-title: A meta-analysis of research on protection motivation theory
  publication-title: Journal of Applied Social Psychology
  doi: 10.1111/j.1559-1816.2000.tb02323.x
– year: 2005
  ident: key2020120619453285700_ref019
  article-title: Why employees do non-work-related computing: an exploratory investigation through multiple theoretical perspectives
– start-page: 181
  year: 2014
  ident: key2020120619453285700_ref036
  article-title: Mobile malware security challeges and cloud-based detection
– year: 2005
  ident: key2020120619453285700_ref052
  article-title: A protection motivation theory approach to home wireless security
– volume: 26
  start-page: 105
  issue: 1
  year: 2010
  ident: key2020120619453285700_ref022
  article-title: Anticipated regret, risk perception, or both: which is most likely responsible for our intention to gamble?
  publication-title: Journal of Gambling Studies
  doi: 10.1007/s10899-009-9149-5
– volume: 8
  start-page: 386
  issue: 7
  year: 2007
  ident: key2020120619453285700_ref010
  article-title: The centrality of awareness in the formation of user behavioral intention toward protective information technologies
  publication-title: Journal of the Association for Information Systems
  doi: 10.17705/1jais.00133
– volume: 33
  start-page: 71
  issue: 1
  year: 2009
  ident: key2020120619453285700_ref024
  article-title: Avoidance of information technology threats: a theoretical perspective
  publication-title: MIS Quarterly
  doi: 10.2307/20650279
– volume: 50
  start-page: 361
  issue: 2
  year: 2011
  ident: key2020120619453285700_ref020
  article-title: Understanding anti-plagiarism software adoption: an extended protection motivation theory perspective
  publication-title: Decision Support Systems
  doi: 10.1016/j.dss.2010.07.009
– volume: 15
  start-page: 336
  issue: 4
  year: 2004
  ident: key2020120619453285700_ref026
  article-title: Internet user’s information privacy concerns (IUIPC): the construct, the scale, and acausal model
  publication-title: Information Systems Research
  doi: 10.1287/isre.1040.0032
– volume: 28
  start-page: 2067
  issue: 6
  year: 2012
  ident: key2020120619453285700_ref032
  article-title: Examining priming and gender as a means to reduce risk in a social networking context: can stories change disclosure and privacy setting use when personal profiles are constructed?
  publication-title: Computers in Human Behavior
  doi: 10.1016/j.chb.2012.06.010
– volume: 46
  start-page: 815
  issue: 4
  year: 2009
  ident: key2020120619453285700_ref030
  article-title: Studying users’ computer security behavior: a health belief perspective
  publication-title: Decision Support Systems
  doi: 10.1016/j.dss.2008.11.010
– volume: 28
  start-page: 816
  issue: 8
  year: 2009
  ident: key2020120619453285700_ref038
  article-title: Self-efficacy in information security: Its influence on end users’ information security practice behaviour
  publication-title: Computers & Security
  doi: 10.1016/j.cose.2009.05.008
– volume-title: Boundaries of Privacy: Dialectics of Disclosure
  year: 2002
  ident: key2020120619453285700_ref037
– start-page: 260
  year: 2015
  ident: key2020120619453285700_ref051
  article-title: Quantifying developers’ adoption of security tools
– volume: 18
  start-page: 15
  issue: 3
  year: 2004
  ident: key2020120619453285700_ref028
  article-title: Strategies for reducing online privacy risks: why consumers read (or don’t read) online privacy notices
  publication-title: Journal of Interactive Marketing
  doi: 10.1002/dir.20009
– volume: 31
  start-page: 83
  issue: 1
  year: 2012
  ident: key2020120619453285700_ref015
  article-title: Understanding information systems security policy compliance: an integration of the theory of planned behavior and the protection motivation theory
  publication-title: Computers & Security
  doi: 10.1016/j.cose.2011.10.007
– volume: 42
  start-page: 495
  issue: 4
  year: 2003
  ident: key2020120619453285700_ref001
  article-title: Acting on intentions: the role of anticipated regret
  publication-title: British Journal of Social Psychology
  doi: 10.1348/014466603322595248
– ident: key2020120619453285700_ref031
– volume: 11
  start-page: 394
  issue: 7
  year: 2010
  ident: key2020120619453285700_ref025
  article-title: Understanding security behaviors in personal computer usage: a threat avoidance perspective
  publication-title: Journal of the Association for Information Systems
  doi: 10.17705/1jais.00232
– volume: 38
  start-page: 685
  issue: 4
  year: 2008
  ident: key2020120619453285700_ref003
  article-title: Future-oriented emotions: conceptualization and behavioral effects
  publication-title: European Journal of Social Psychology
  doi: 10.1002/ejsp.467
– volume: 34
  start-page: 47
  year: 2013
  ident: key2020120619453285700_ref029
  article-title: Delegate the smartphone user? Security awareness in smartphone platforms
  publication-title: Computers & Security
  doi: 10.1016/j.cose.2012.11.004
– volume: 11
  start-page: 94
  issue: 4
  year: 1997
  ident: key2020120619453285700_ref033
  article-title: Direct marketing and the use of individual-level consumer information: determining how and when ‘privacy’ matters
  publication-title: Journal of Direct Marketing
  doi: 10.1002/(SICI)1522-7138(199723)11:4<94::AID-DIR11>3.0.CO;2-F
– start-page: 793
  year: 2004
  ident: key2020120619453285700_ref056
  article-title: Alleviating consumers’ privacy concerns in location-based services: a psychological control perspective
– volume: 26
  start-page: 1
  issue: 1
  year: 1996
  ident: key2020120619453285700_ref035
  article-title: Modifying beliefs and attitudes to exceeding the speed limit: an intervention study based on the theory of planned behaviour
  publication-title: Journal of Applied Social Psychology
  doi: 10.1111/j.1559-1816.1996.tb01835.x
– volume: 7
  start-page: 154
  issue: 2
  year: 2009
  ident: key2020120619453285700_ref055
  article-title: Perceived effectiveness of text vs multimedia location-based advertising messaging
  publication-title: International Journal of Mobile Communications
  doi: 10.1504/IJMC.2009.022440
– volume: 47
  start-page: 154
  issue: 2
  year: 2009
  ident: key2020120619453285700_ref013
  article-title: Encouraging information security behaviors in organizations: role of penalties, pressures and perceived effectiveness
  publication-title: Decision Support Systems
  doi: 10.1016/j.dss.2009.02.005
– volume: 31
  start-page: 19
  issue: 1
  year: 2007
  ident: key2020120619453285700_ref014
  article-title: The value of privacy assurance: an exploratory field experiment
  publication-title: MIS Quarterly
  doi: 10.2307/25148779
– volume: 32
  start-page: 503
  issue: 3
  year: 2008
  ident: key2020120619453285700_ref044
  article-title: Internet users’ information privacy-protective responses: a taxonomy and a nomological model
  publication-title: MIS Quarterly
  doi: 10.2307/25148854
– volume: 34
  start-page: 549
  issue: 3
  year: 2010
  ident: key2020120619453285700_ref016
  article-title: Fear appeals and information security behaviors: an empirical study
  publication-title: MIS Quarterly
  doi: 10.2307/25750691
– volume: 3842
  start-page: 741
  year: 2006
  ident: key2020120619453285700_ref034
  article-title: WIPI mobile platform with secure service for mobile RFID network environment
  publication-title: Advanced Web and Network Technologies, and Applications
  doi: 10.1007/11610496_100
– volume: 11
  start-page: 85
  issue: 1
  year: 2006
  ident: key2020120619453285700_ref007
  article-title: Role of anticipated regret, intentions and intention stability in adolescent smoking initiation
  publication-title: British Journal of Health Psychology
  doi: 10.1348/135910705X40997
– volume: 29
  start-page: 2107
  issue: 10
  year: 1999
  ident: key2020120619453285700_ref040
  article-title: Augmenting the theory of planned behavior: roles for anticipated regret and descriptive norms
  publication-title: Journal of Applied Social Psychology
  doi: 10.1111/j.1559-1816.1999.tb02298.x
– volume: 6
  start-page: 156
  issue: 9
  year: 2006
  ident: key2020120619453285700_ref046
  article-title: An advanced mutual-authentication algorithm using AES for RFID systems
  publication-title: International Journal of Computer Science and Network Security
– volume: 22
  start-page: 441
  issue: 4
  year: 1998
  ident: key2020120619453285700_ref045
  article-title: Coping with systems risk: security planning models for management decision making
  publication-title: MIS Quarterly
  doi: 10.2307/249551
– volume: 51
  start-page: 217
  issue: 2
  year: 2014
  ident: key2020120619453285700_ref042
  article-title: Employees’ adherence to information security policies: an exploratory field study
  publication-title: Information & Management
  doi: 10.1016/j.im.2013.08.006
– volume: 39
  start-page: 2985
  issue: 12
  year: 2009
  ident: key2020120619453285700_ref039
  article-title: Expanding the affective and normative components of the theory of planned behavior: a meta-analysis of anticipated affect and moral norms
  publication-title: Journal of Applied Social Psychology
  doi: 10.1111/j.1559-1816.2009.00558.x
– ident: key2020120619453285700_ref048
– start-page: 401
  volume-title: Information Security for Global Information Infrastructures
  year: 2000
  ident: key2020120619453285700_ref043
  article-title: On the role of human morality in information system security
– volume: 58
  start-page: 157
  issue: 2
  year: 2007
  ident: key2020120619453285700_ref004
  article-title: Development of measures of online privacy concern and protection for use on the Internet
  publication-title: Journal of the American Society for Information Science and Technology
  doi: 10.1002/asi.20459
– start-page: 289
  year: 2014
  ident: key2020120619453285700_ref023
  article-title: Smartphone: security and
  publication-title: privacy protection, Pervasive Computing and the Networked World
– year: 2008
  ident: key2020120619453285700_ref053
  article-title: Examining the formation of individual’s privacy concerns: toward an integrative view
– volume: 49
  start-page: 190
  issue: 3/4
  year: 2012
  ident: key2020120619453285700_ref047
  article-title: Motivating IS security compliance: insights from habit and protection motivation theory
  publication-title: Information & Management
– volume: 18
  start-page: 326
  issue: 4
  year: 2007
  ident: key2020120619453285700_ref050
  article-title: Causes and consequences of consumer online privacy concern
  publication-title: International Journal of Service Industry Management
  doi: 10.1108/09564230710778128
– volume: 42
  start-page: 84
  issue: 2
  year: 2007
  ident: key2020120619453285700_ref008
  article-title: Predicting binge-drinking behaviour using an extended TPB: examining the impact of anticipated regret and descriptive norms
  publication-title: Alcohol and Alcoholism
– year: 2012
  ident: key2020120619453285700_ref027
  article-title: An integrative model of information security awareness for assessing information system security risk
– volume: 12
  start-page: 93
  year: 1999
  ident: key2020120619453285700_ref057
  article-title: Anticipated regret, expected feedback and behavioral decision making
  publication-title: Journal of Behavioral Decision Making
  doi: 10.1002/(SICI)1099-0771(199906)12:2<93::AID-BDM311>3.0.CO;2-S
SSID ssj0001916361
Score 2.263303
SourceID crossref
SourceType Enrichment Source
Index Database
StartPage 330
Subtitle A technology threat avoidance perspective
Title Mobile device users’ privacy security assurance behavior
Volume 25
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1NT8IwGG4QL17Ez4gfpAcvHgZt15XNGyEimsBFSZDLsn4sEnEQGCZ68m_49_wltttKiNGDifd3S_emfd6PvX0eAM6xywQRmDmupNyhQSScSMOeg3ggBIrjgGQ8270-6w7o7dAblkDf3oXJxirzdkyG0-NkYYrUhhnc1ii8Ihww6jU37TvT19chTBfFpoY3HevGY_o82dA73WP26q_tuOhMyM0IVImO-npdDNv_lj-8bC1OrQWcTgVM7VLzOZOn-jLldfH2jcXx_75lB2wXuSls5ZtpF5RUsgcqVvcBFjCwDy57U67BBEplYAaaPsfi8_0Dzubjl0i8wkWhiQd1Yr40wh0KWjaAAzDoXN23u06hweAIQt3U4U3D6MWVxFiyiHmYc8_HSp96jFzJOPdJjBQJCM-o_FgzQjJmERdI-VQq5h6CcjJN1BGA2pY1ueSukAFlvjSllsIxjXyi3CbxqqBhPR6KgqDc6GRMwqxQQX6onRQiGhonhcZJVXCxemKWk3P8anv8B9sTsEVM9M46LaegnM6X6kznHimvZVuqBjZHD6PW9RfavNUx
linkProvider Emerald
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Mobile+device+users%E2%80%99+privacy+security+assurance+behavior&rft.jtitle=Information+and+computer+security&rft.au=Chen%2C+Hao&rft.au=Li%2C+Wenli&rft.date=2017-01-01&rft.issn=2056-4961&rft.volume=25&rft.issue=3&rft.spage=330&rft.epage=344&rft_id=info:doi/10.1108%2FICS-04-2016-0027&rft.externalDBID=n%2Fa&rft.externalDocID=10_1108_ICS_04_2016_0027
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2056-4961&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2056-4961&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2056-4961&client=summon