Metrics

From
A Grounded Theory of Security and Technical Barriers to the Continuance Use of Cloud Storage by SMEs by Kunle Elebute Information Security and Computer Fraud. 2018, 6(1), 1-7 doi:10.12691/iscf-6-1-1
Views
4380
Html 3828
Abstract 552
04 December 2018 (publication date) through 07 June 2020 *
9.54 % of article views led to PDF downloads *
*Although we update our data on a daily basis, there may be a 48-hour delay before the most recent numbers are available.
Downloads: 1779
PDF418
Epub379
XML450
PPT298
Figures122
Tables112
Export: 1246
RIS355
BibTex499
Endnote392
RIS, BibTex, EndNote allows users to search, retrieve and store citations from bibliographic databases such as ABI Inform, the Web of Science, Anthropological Literature, the MLA bibliography, or the catalogs of individual libraries.
Area Chart Example: If your want to see the details of daily statistics for this article, please click here to login our Manuscript Tracking System.
Citations
0
Found additional citations for the article? Please contact us at submission@sciepub.com.
Shares & bookmarks
Facebook0
Twitter0
LinkedIn0
Google +0
Found additional shares or bookmarks for the article? Please contact us at submission@sciepub.com