Applying the Lost-Letter Technique to Assess IT Risk Behaviour

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

3 Citations (Scopus)

Fingerprint

Dive into the research topics of 'Applying the Lost-Letter Technique to Assess IT Risk Behaviour'. Together they form a unique fingerprint.