Metrics

From
A Grounded Theory of Security and Technical Barriers to the Continuance Use of Cloud Storage by SMEs by Kunle Elebute Information Security and Computer Fraud. 2018, 6(1), 1-7 doi:10.12691/iscf-6-1-1
Views
1446
Html 1228
Abstract 218
04 December 2018 (publication date) through 17 June 2019 *
11.62 % of article views led to PDF downloads *
*Although we update our data on a daily basis, there may be a 48-hour delay before the most recent numbers are available.
Downloads: 561
PDF168
Epub109
XML111
PPT118
Figures28
Tables27
Export: 423
RIS118
BibTex178
Endnote127
RIS, BibTex, EndNote allows users to search, retrieve and store citations from bibliographic databases such as ABI Inform, the Web of Science, Anthropological Literature, the MLA bibliography, or the catalogs of individual libraries.
Area Chart Example: If your want to see the details of daily statistics for this article, please click here to login our Manuscript Tracking System.
Citations
0
Found additional citations for the article? Please contact us at submission@sciepub.com.
Shares & bookmarks
Facebook0
Twitter0
LinkedIn0
Google +0
Found additional shares or bookmarks for the article? Please contact us at submission@sciepub.com