Journal: IJCBPL

Volume 9, Issue 3

1 -- 14Scott E. Mensch, LeAnn Wilkie. Smart Phone Security Practices: Item Analysis of Mobile Security Behaviors of College Students
15 -- 31Robert Andrew Dunn, Rosanna E. Guadagno. Who Are You Online?: A Study of Gender, Race, and Gaming Experience and Context on Avatar Self-Representation
32 -- 47Marco Vassallo. The Privacy Paradox in the Big Data Era? No Thanks, We Are the E-People: The E-People in the Big Data Era
48 -- 60Youngkeun Choi. Organizational Control Policy, Information Security Deviance, and Moderating Effect of Power Distance Orientation: Organizational Control Policy and Information Security Deviance