MLA
Warkentin, Merrill. "A TAM Analysis of an Alternative High-Security User Authentication Procedure." Information Security and Ethics: Concepts, Methodologies, Tools, and Applications, edited by Hamid Nemati, IGI Global, 2008, pp. 2114-2129. https://doi.org/10.4018/978-1-59904-937-3.ch142
APA
Warkentin, M. (2008). A TAM Analysis of an Alternative High-Security User Authentication Procedure. In H. Nemati (Ed.), Information Security and Ethics: Concepts, Methodologies, Tools, and Applications (pp. 2114-2129). IGI Global. https://doi.org/10.4018/978-1-59904-937-3.ch142
Chicago
Warkentin, Merrill. "A TAM Analysis of an Alternative High-Security User Authentication Procedure." In Information Security and Ethics: Concepts, Methodologies, Tools, and Applications, edited by Hamid Nemati, 2114-2129. Hershey, PA: IGI Global, 2008. https://doi.org/10.4018/978-1-59904-937-3.ch142
Export Reference