MLA
Aytes, Kregg and Terry Connolly. "Computer Security and Risky Computing Practices: A Rational Choice Perspective." End-User Computing: Concepts, Methodologies, Tools, and Applications. IGI Global, 2008. 1690-1707. Web. 11 Dec. 2019. doi:10.4018/978-1-59904-945-8.ch115
APA
Aytes, K., & Connolly, T. (2008). Computer Security and Risky Computing Practices: A Rational Choice Perspective. In S. Clarke (Ed.), End-User Computing: Concepts, Methodologies, Tools, and Applications (pp. 1690-1707). Hershey, PA: IGI Global. doi:10.4018/978-1-59904-945-8.ch115
Chicago
Aytes, Kregg and Terry Connolly. "Computer Security and Risky Computing Practices: A Rational Choice Perspective." In End-User Computing: Concepts, Methodologies, Tools, and Applications, ed. Steve Clarke, 1690-1707 (2008), accessed December 11, 2019. doi:10.4018/978-1-59904-945-8.ch115
Export Reference