MLA
Warkentin, Merrill, et al. "A TAM Analysis of an Alternative High-Security User Authentication Procedure." Advanced Topics in End User Computing, Volume 4, edited by Mo Adam Mahmood, IGI Global, 2005, pp. 280-300. https://doi.org/10.4018/978-1-59140-474-3.ch014
APA
Warkentin, M., Davis, K., & Bekkering, E. (2005). A TAM Analysis of an Alternative High-Security User Authentication Procedure. In M. Mahmood (Ed.), Advanced Topics in End User Computing, Volume 4 (pp. 280-300). IGI Global. https://doi.org/10.4018/978-1-59140-474-3.ch014
Chicago
Warkentin, Merrill, Kimberly Davis, and Ernst Bekkering. "A TAM Analysis of an Alternative High-Security User Authentication Procedure." In Advanced Topics in End User Computing, Volume 4, edited by Mo Adam Mahmood, 280-300. Hershey, PA: IGI Global, 2005. https://doi.org/10.4018/978-1-59140-474-3.ch014
Export Reference
