Metrics

From
A Grounded Theory of Security and Technical Barriers to the Continuance Use of Cloud Storage by SMEs by Kunle Elebute Information Security and Computer Fraud. 2018, 6(1), 1-7 doi:10.12691/iscf-6-1-1
Views
8000
Html 7253
Abstract 747
04 December 2018 (publication date) through 02 February 2023 *
12.23 % of article views led to PDF downloads *
*Although we update our data on a daily basis, there may be a 48-hour delay before the most recent numbers are available.
Downloads: 4279
PDF978
Epub1059
XML934
PPT835
Figures234
Tables239
Export: 3267
RIS931
BibTex1277
Endnote1059
RIS, BibTex, EndNote allows users to search, retrieve and store citations from bibliographic databases such as ABI Inform, the Web of Science, Anthropological Literature, the MLA bibliography, or the catalogs of individual libraries.
Area Chart Example: If your want to see the details of daily statistics for this article, please click here to login our Manuscript Tracking System.
Citations
0
Found additional citations for the article? Please contact us at submission@sciepub.com.
Shares & bookmarks
Facebook0
Twitter0
LinkedIn0
Google +0
Found additional shares or bookmarks for the article? Please contact us at submission@sciepub.com