Metrics

From
A Grounded Theory of Security and Technical Barriers to the Continuance Use of Cloud Storage by SMEs by Kunle Elebute Information Security and Computer Fraud. 2018, 6(1), 1-7 doi:10.12691/iscf-6-1-1
Views
1835
Html 1570
Abstract 265
04 December 2018 (publication date) through 22 August 2019 *
11.34 % of article views led to PDF downloads *
*Although we update our data on a daily basis, there may be a 48-hour delay before the most recent numbers are available.
Downloads: 726
PDF208
Epub145
XML152
PPT139
Figures41
Tables41
Export: 536
RIS154
BibTex220
Endnote162
RIS, BibTex, EndNote allows users to search, retrieve and store citations from bibliographic databases such as ABI Inform, the Web of Science, Anthropological Literature, the MLA bibliography, or the catalogs of individual libraries.
Area Chart Example: If your want to see the details of daily statistics for this article, please click here to login our Manuscript Tracking System.
Citations
0
Found additional citations for the article? Please contact us at submission@sciepub.com.
Shares & bookmarks
Facebook0
Twitter0
LinkedIn0
Google +0
Found additional shares or bookmarks for the article? Please contact us at submission@sciepub.com