Toward assessing the impact of mobile security issues in pedagogical delivery: A mobile learning case study
暂无分享,去创建一个
[1] Harold Tipton,et al. Security Management Practices , 2000 .
[2] Jon Friedman,et al. Protecting data on mobile devices: A taxonomy of security threats to mobile computing and review of applicable defenses , 2008, Inf. Knowl. Syst. Manag..
[3] Radha Damodaram. SECURITY MEASURES OF RANDVUL KEYBOARD , 2010 .
[4] Viswanath Venkatesh,et al. Designing E-Government Services: Key Service Attributes and Citizens’ Preference Structures , 2012 .
[5] Fred D. Davis,et al. A Theoretical Extension of the Technology Acceptance Model: Four Longitudinal Field Studies , 2000, Management Science.
[6] Samuel T. C. Thompson. Helping the Hacker? Library Information, Security, and Social Engineering , 2006 .
[7] Peter A. Todd,et al. Understanding Information Technology Usage: A Test of Competing Models , 1995, Inf. Syst. Res..
[8] I. Seidman. Interviewing as qualitative research : a guide for researchersin education and the social sciences , 1991 .
[9] Sarah Henderson,et al. iPad in Education: A Case Study of iPad Adoption and Use in a Primary School , 2012, 2012 45th Hawaii International Conference on System Sciences.
[10] Fred D. Davis. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..
[11] Fred D. Davis,et al. User Acceptance of Computer Technology: A Comparison of Two Theoretical Models , 1989 .
[12] Gordon B. Davis,et al. User Acceptance of Information Technology: Toward a Unified View , 2003, MIS Q..
[13] Christopher Hadnagy,et al. Social Engineering: The Art of Human Hacking , 2010 .