MLA
Aytes, Kregg, and Terry Connolly. "Computer Security and Risky Computing Practices: A Rational Choice Perspective." Advanced Topics in End User Computing, Volume 4, edited by Mo Adam Mahmood, IGI Global, 2005, pp. 257-279. https://doi.org/10.4018/978-1-59140-474-3.ch013
APA
Aytes, K. & Connolly, T. (2005). Computer Security and Risky Computing Practices: A Rational Choice Perspective. In M. Mahmood (Ed.), Advanced Topics in End User Computing, Volume 4 (pp. 257-279). IGI Global. https://doi.org/10.4018/978-1-59140-474-3.ch013
Chicago
Aytes, Kregg, and Terry Connolly. "Computer Security and Risky Computing Practices: A Rational Choice Perspective." In Advanced Topics in End User Computing, Volume 4, edited by Mo Adam Mahmood, 257-279. Hershey, PA: IGI Global, 2005. https://doi.org/10.4018/978-1-59140-474-3.ch013
Export Reference