MLA
Aytes, Kregg, and Terry Connolly. "Computer Security and Risky Computing Practices: A Rational Choice Perspective." End-User Computing: Concepts, Methodologies, Tools, and Applications, edited by Steve Clarke, IGI Global, 2008, pp. 1690-1707. https://doi.org/10.4018/978-1-59904-945-8.ch115
APA
Aytes, K. & Connolly, T. (2008). Computer Security and Risky Computing Practices: A Rational Choice Perspective. In S. Clarke (Ed.), End-User Computing: Concepts, Methodologies, Tools, and Applications (pp. 1690-1707). IGI Global. https://doi.org/10.4018/978-1-59904-945-8.ch115
Chicago
Aytes, Kregg, and Terry Connolly. "Computer Security and Risky Computing Practices: A Rational Choice Perspective." In End-User Computing: Concepts, Methodologies, Tools, and Applications, edited by Steve Clarke, 1690-1707. Hershey, PA: IGI Global, 2008. https://doi.org/10.4018/978-1-59904-945-8.ch115
Export Reference
