Please log in to take part in the discussion (add own reviews or comments).
Cite this publication
More citation styles
- please select -
%0 Journal Article
%1 journals/itpro/EarleyHLM14
%A Earley, Seth
%A Harmon, Robert R.
%A Lee, Maria R.
%A Mithas, Sunil
%D 2014
%J IT Prof.
%K dblp
%N 5
%P 16-18
%T From BYOD to BYOA, Phishing, and Botnets.
%U http://dblp.uni-trier.de/db/journals/itpro/itpro16.html#EarleyHLM14
%V 16
@article{journals/itpro/EarleyHLM14,
added-at = {2020-03-12T00:00:00.000+0100},
author = {Earley, Seth and Harmon, Robert R. and Lee, Maria R. and Mithas, Sunil},
biburl = {https://www.bibsonomy.org/bibtex/20f082e2df9a8c60f2ef7f81c18960a46/dblp},
ee = {http://doi.ieeecomputersociety.org/10.1109/MITP.2014.69},
interhash = {c351d7526eab7de98ca843dce2cb03ad},
intrahash = {0f082e2df9a8c60f2ef7f81c18960a46},
journal = {IT Prof.},
keywords = {dblp},
number = 5,
pages = {16-18},
timestamp = {2020-03-13T11:47:17.000+0100},
title = {From BYOD to BYOA, Phishing, and Botnets.},
url = {http://dblp.uni-trier.de/db/journals/itpro/itpro16.html#EarleyHLM14},
volume = 16,
year = 2014
}