Metrics

From
A Grounded Theory of Security and Technical Barriers to the Continuance Use of Cloud Storage by SMEs by Kunle Elebute Information Security and Computer Fraud. 2018, 6(1), 1-7 doi:10.12691/iscf-6-1-1
Views
9294
Html 8546
Abstract 748
04 December 2018 (publication date) through 26 April 2024 *
13.28 % of article views led to PDF downloads *
*Although we update our data on a daily basis, there may be a 48-hour delay before the most recent numbers are available.
Downloads: 5237
PDF1234
Epub1246
XML1137
PPT1020
Figures298
Tables302
Export: 3824
RIS1105
BibTex1483
Endnote1236
RIS, BibTex, EndNote allows users to search, retrieve and store citations from bibliographic databases such as ABI Inform, the Web of Science, Anthropological Literature, the MLA bibliography, or the catalogs of individual libraries.
Area Chart Example: If your want to see the details of daily statistics for this article, please click here to login our Manuscript Tracking System.
Citations
0
Found additional citations for the article? Please contact us at submission@sciepub.com.
Shares & bookmarks
Facebook0
Twitter0
LinkedIn0
Google +0
Found additional shares or bookmarks for the article? Please contact us at submission@sciepub.com