{"title":"技术使用模式如何影响网络钓鱼的易感性?重新制定的控制基因座作用的两波研究","authors":"E. Ayaburi, F. Andoh-Baidoo","doi":"10.1080/0960085x.2023.2186275","DOIUrl":null,"url":null,"abstract":"","PeriodicalId":50486,"journal":{"name":"European Journal of Information Systems","volume":" ","pages":""},"PeriodicalIF":7.3000,"publicationDate":"2023-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"How do technology use patterns influence phishing susceptibility? A two-wave study of the role of reformulated locus of control\",\"authors\":\"E. Ayaburi, F. Andoh-Baidoo\",\"doi\":\"10.1080/0960085x.2023.2186275\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"\",\"PeriodicalId\":50486,\"journal\":{\"name\":\"European Journal of Information Systems\",\"volume\":\" \",\"pages\":\"\"},\"PeriodicalIF\":7.3000,\"publicationDate\":\"2023-03-06\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"European Journal of Information Systems\",\"FirstCategoryId\":\"91\",\"ListUrlMain\":\"https://doi.org/10.1080/0960085x.2023.2186275\",\"RegionNum\":2,\"RegionCategory\":\"管理学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"European Journal of Information Systems","FirstCategoryId":"91","ListUrlMain":"https://doi.org/10.1080/0960085x.2023.2186275","RegionNum":2,"RegionCategory":"管理学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
期刊介绍:
The European Journal of Information Systems offers a unique European perspective on the theory and practice of information systems for a global readership. We actively seek first-rate articles that offer a critical examination of information technology, covering its effects, development, implementation, strategy, management, and policy.