Skip to main content
Erschienen in: Information Systems Frontiers 6/2022

23.10.2021

Online Users’ Identity Theft and Coping Strategies, Attribution and Sense of Urgency: A Non-Linear Quadratic Effect Assessment

verfasst von: A. F. Salam, Hua Dai, Lei Wang

Erschienen in: Information Systems Frontiers | Ausgabe 6/2022

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Defined as someone using other’s personally identifiable information to make profit or commit crimes, identity theft has become a critical problem for the whole society. The development of Internet technology has made this problem worse. Results of empirical assessment including non-linear quadratic effect prove that when users have the perception of more control over the identity theft threat, they are likely to find solutions, feel it is their responsibility and has more intentions for identity theft prevention actions to prevent identity theft. Interestingly, our theory and empirical results suggest that quadratic effect exist among critical constructs in our theoretical model and that the underlying complexity require further investigation and that linear models may not be necessarily sufficient. We further contribute by developing theory and empirical validation of non-linear quadratic effect among key constructs related to Identity theft in the context of IT security literature.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Bandura, A. (1986). Social foundations of thought and action: A social cognitive theory. Prentice Hall. Bandura, A. (1986). Social foundations of thought and action: A social cognitive theory. Prentice Hall.
Zurück zum Zitat Beaudry, A., & Pinsonneault, A. (2005). Understanding user responses to information technology: A coping model of user adaptation. MIS Quarterly, 29(3), 493–524.CrossRef Beaudry, A., & Pinsonneault, A. (2005). Understanding user responses to information technology: A coping model of user adaptation. MIS Quarterly, 29(3), 493–524.CrossRef
Zurück zum Zitat Brickman, P. (1987). Commitment, conflict, and caring. Prentice-Hall. Brickman, P. (1987). Commitment, conflict, and caring. Prentice-Hall.
Zurück zum Zitat Brickman, P., Rabinowitz, V. C., Karuza, J., Coates, D., Cohn, E., & Kidder, L. (1982). Models of helping and coping. American Psychologist, 37(4), 368–384 Brickman, P., Rabinowitz, V. C., Karuza, J., Coates, D., Cohn, E., & Kidder, L. (1982). Models of helping and coping. American Psychologist, 37(4), 368–384
Zurück zum Zitat Carver, C. S., Scheier, M. F., & Weintraub, J. K. (1989). Assessing coping strategies: A theoretically based approach. Journal of Personality and Social Psychology, 56(2), 267–283.CrossRef Carver, C. S., Scheier, M. F., & Weintraub, J. K. (1989). Assessing coping strategies: A theoretically based approach. Journal of Personality and Social Psychology, 56(2), 267–283.CrossRef
Zurück zum Zitat Cavusoglu, H., Mishra, B., & Raghunathan, S. (2004). The effect of internet security breach announcements on market value: Capital market reactions for breached firms and internet security developers. International Journal of Electronic Commerce, 9(1), 69–104.CrossRef Cavusoglu, H., Mishra, B., & Raghunathan, S. (2004). The effect of internet security breach announcements on market value: Capital market reactions for breached firms and internet security developers. International Journal of Electronic Commerce, 9(1), 69–104.CrossRef
Zurück zum Zitat Chai, S., Bagchi-Sen, S., Morrell, C., Rao, H. R., & Upadhyaya, S. (2006). Role of Perceived Importance of Information Security: An Exploratory study of Middle School Children’s Information Security Behavior. Issues in Informing Science and Information Technology, 3, 127–135.CrossRef Chai, S., Bagchi-Sen, S., Morrell, C., Rao, H. R., & Upadhyaya, S. (2006). Role of Perceived Importance of Information Security: An Exploratory study of Middle School Children’s Information Security Behavior. Issues in Informing Science and Information Technology, 3, 127–135.CrossRef
Zurück zum Zitat Chen, Y., Galletta, D. F., Lowry, P. B., Luo, X., Moody, G. D., & Willison, R. (2021). Understanding inconsistent employee compliance with information security policies through the lens of the extended parallel process model. Information Systems Research. Chen, Y., Galletta, D. F., Lowry, P. B., Luo, X., Moody, G. D., & Willison, R. (2021). Understanding inconsistent employee compliance with information security policies through the lens of the extended parallel process model. Information Systems Research.
Zurück zum Zitat Cheng, X., Su, L., Luo, X., Benitez, J., & Cai, S. (2021). The good, the bad, and the ugly: impact of analytics and artificial intelligence-enabled personal information collection on privacy and participation in ridesharing. European Journal of Information Systems, 1–25 Cheng, X., Su, L., Luo, X., Benitez, J., & Cai, S. (2021). The good, the bad, and the ugly: impact of analytics and artificial intelligence-enabled personal information collection on privacy and participation in ridesharing. European Journal of Information Systems, 1–25
Zurück zum Zitat Chin, W. W. (1998). Issues and opinion on structural equation modeling. MIS Quarterly, 22(1), 7–16. Chin, W. W. (1998). Issues and opinion on structural equation modeling. MIS Quarterly, 22(1), 7–16.
Zurück zum Zitat Chin, W. W., & Todd, P. A. (1995). On the use, usefulness, and ease of use of structural equation modeling in MIS research: A note of caution. MIS Quarterly, 19(2), 237–246.CrossRef Chin, W. W., & Todd, P. A. (1995). On the use, usefulness, and ease of use of structural equation modeling in MIS research: A note of caution. MIS Quarterly, 19(2), 237–246.CrossRef
Zurück zum Zitat Chin, W. W., Marcolin, B., & Newsted, P. (2003). A partial least squares latent variable modeling approach for measuring interaction effects: Results from a Monte Carlo simulation study and an electronic mail adoption study. Information Systems Research, 14(2), 189–217.CrossRef Chin, W. W., Marcolin, B., & Newsted, P. (2003). A partial least squares latent variable modeling approach for measuring interaction effects: Results from a Monte Carlo simulation study and an electronic mail adoption study. Information Systems Research, 14(2), 189–217.CrossRef
Zurück zum Zitat Choi, H. S., Carpenter, D., & Ko, M. S. (2021). Risk taking behaviors using public Wi-fi™. Information Systems Frontiers, 1–18. Choi, H. S., Carpenter, D., & Ko, M. S. (2021). Risk taking behaviors using public Wi-fi™. Information Systems Frontiers, 1–18.
Zurück zum Zitat Crossler, R. E., Bélanger, F., & Ormond, D. (2019). The quest for complete security: An empirical analysis of users’ multi-layered protection from security threats. Information Systems Frontiers, 21(2), 343–357.CrossRef Crossler, R. E., Bélanger, F., & Ormond, D. (2019). The quest for complete security: An empirical analysis of users’ multi-layered protection from security threats. Information Systems Frontiers, 21(2), 343–357.CrossRef
Zurück zum Zitat Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), 319–340.CrossRef Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), 319–340.CrossRef
Zurück zum Zitat Folkman, S. (1992). Making the case for coping. In B. N. Carpenter (Ed.), Personal coping: Theory, research, and application (pp. 31–46). Praeger. Folkman, S. (1992). Making the case for coping. In B. N. Carpenter (Ed.), Personal coping: Theory, research, and application (pp. 31–46). Praeger.
Zurück zum Zitat Folkman, S., & Moskowitz, J. T. (2000). Positive affect and the other side of coping. American Psychologist, 55(6), 647–654.CrossRef Folkman, S., & Moskowitz, J. T. (2000). Positive affect and the other side of coping. American Psychologist, 55(6), 647–654.CrossRef
Zurück zum Zitat Fornell, C., & Larcker, V. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1), 39–50.CrossRef Fornell, C., & Larcker, V. F. (1981). Evaluating structural equation models with unobservable variables and measurement error. Journal of Marketing Research, 18(1), 39–50.CrossRef
Zurück zum Zitat Gorden, M. E., Slade, L. A., & Schmitt, N. (1986). The ‘science of the sophomore’ revisited: From conjecture to empiricism. Academic Management Review, 11(1), 191–207. Gorden, M. E., Slade, L. A., & Schmitt, N. (1986). The ‘science of the sophomore’ revisited: From conjecture to empiricism. Academic Management Review, 11(1), 191–207.
Zurück zum Zitat Haans, P., Pieters, C., & He, Z. (2016). Thinking about U: Theorizing and testing U and inverted U-shaped relationships in strategy research. Strategic Management Journal, 37, 1177–1195.CrossRef Haans, P., Pieters, C., & He, Z. (2016). Thinking about U: Theorizing and testing U and inverted U-shaped relationships in strategy research. Strategic Management Journal, 37, 1177–1195.CrossRef
Zurück zum Zitat Hair, J., Hult, G., Ringle, C., & Sarstedt, M. (2017). A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM) (2nd ed.). Sage. Hair, J., Hult, G., Ringle, C., & Sarstedt, M. (2017). A Primer on Partial Least Squares Structural Equation Modeling (PLS-SEM) (2nd ed.). Sage.
Zurück zum Zitat Heider, F. (1958). The psychology of interpersonal relations. John Wiley & Sons.CrossRef Heider, F. (1958). The psychology of interpersonal relations. John Wiley & Sons.CrossRef
Zurück zum Zitat Henseler, J., Fassott, G., Dijkstra, T., & Wison, B. (2011). Analyzing quadratic effects of formative constructs by means of variance-based structural equation modelling. European Journal of Information Systems, 1–14. Henseler, J., Fassott, G., Dijkstra, T., & Wison, B. (2011). Analyzing quadratic effects of formative constructs by means of variance-based structural equation modelling. European Journal of Information Systems, 1–14.
Zurück zum Zitat Henseler, J., Fassott, G., Dijkstra, T. K., & Wilson, B. (2012). Analysing quadratic effects of formative constructs by means of variance-based structural equation modelling. European Journal of Information Systems, 21(1), 99–112 Henseler, J., Fassott, G., Dijkstra, T. K., & Wilson, B. (2012). Analysing quadratic effects of formative constructs by means of variance-based structural equation modelling. European Journal of Information Systems, 21(1), 99–112
Zurück zum Zitat Herath, T., & Rao, H. R. (2009). Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness. Decision Support Systems, 47(2), 154–165 Herath, T., & Rao, H. R. (2009). Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness. Decision Support Systems, 47(2), 154–165
Zurück zum Zitat Jenkins, J., Durcikova, A., & Nunamaker, J. (2021). Mitigating the security intention-behavior gap: The moderating role of required effort on the intention-behavior relationship. Journal of the Association for Information Systems, 22(1), 246–272.CrossRef Jenkins, J., Durcikova, A., & Nunamaker, J. (2021). Mitigating the security intention-behavior gap: The moderating role of required effort on the intention-behavior relationship. Journal of the Association for Information Systems, 22(1), 246–272.CrossRef
Zurück zum Zitat Kahn, C. M., & Roberds, W. (2008). Credit and identity theft. Journal of Monetary Economics, 55(2), 251–264 Kahn, C. M., & Roberds, W. (2008). Credit and identity theft. Journal of Monetary Economics, 55(2), 251–264
Zurück zum Zitat Kelley, H. H., & Michela, J. L. (1980). Attribution Theory and Research. Annual Review of Psychology, 31, 457–501.CrossRef Kelley, H. H., & Michela, J. L. (1980). Attribution Theory and Research. Annual Review of Psychology, 31, 457–501.CrossRef
Zurück zum Zitat Kim, D. J., Ferrin, D. L., & Rao, H. R. (2008). Trust and satisfaction, two stepping stones for successful E-Commerce Relationships: A longitudinal exploration. Information Systems Research (Articles in Advance), 1–21. Kim, D. J., Ferrin, D. L., & Rao, H. R. (2008). Trust and satisfaction, two stepping stones for successful E-Commerce Relationships: A longitudinal exploration. Information Systems Research (Articles in Advance), 1–21.
Zurück zum Zitat Kim, D. J., Ferrin, D. L., & Rao, H. R. (2009). Trust and satisfaction, two stepping stones for successful e-commerce relationships: A longitudinal exploration. Information Systems Research, 20(2), 237–257 Kim, D. J., Ferrin, D. L., & Rao, H. R. (2009). Trust and satisfaction, two stepping stones for successful e-commerce relationships: A longitudinal exploration. Information Systems Research, 20(2), 237–257
Zurück zum Zitat Kotter, J. (2008). A sense of urgency. Harvard Business Press. Kotter, J. (2008). A sense of urgency. Harvard Business Press.
Zurück zum Zitat LaRose, R., Rifon, N. J., & Enbody, R. (2008). Promoting personal responsibility for internet safety. Communications of the ACM, 51(3), 71–76.CrossRef LaRose, R., Rifon, N. J., & Enbody, R. (2008). Promoting personal responsibility for internet safety. Communications of the ACM, 51(3), 71–76.CrossRef
Zurück zum Zitat Lazarus, R. S. (1966). Psychological stress and the coping process. McGraw-Hill. Lazarus, R. S. (1966). Psychological stress and the coping process. McGraw-Hill.
Zurück zum Zitat Lazarus, R. S., & Folkman, S. (1984). Stress, appraisal and coping. Springer-Verlag. Lazarus, R. S., & Folkman, S. (1984). Stress, appraisal and coping. Springer-Verlag.
Zurück zum Zitat Lee, Y., & Kozar, K. A. (2008). An empirical investigation of anti-spyware software adoption: A multitheoretical perspective. Information & Management, 45(2), 109–119.CrossRef Lee, Y., & Kozar, K. A. (2008). An empirical investigation of anti-spyware software adoption: A multitheoretical perspective. Information & Management, 45(2), 109–119.CrossRef
Zurück zum Zitat Lee, M., & Lee, J. (2012). The impact of information security failure on customer behaviors: A study on a large-scale hacking incident on the internet. Information Systems Frontiers, 14(2), 375–393.CrossRef Lee, M., & Lee, J. (2012). The impact of information security failure on customer behaviors: A study on a large-scale hacking incident on the internet. Information Systems Frontiers, 14(2), 375–393.CrossRef
Zurück zum Zitat Leventhal, H., Safer, M. A., & Panagis, D. M. (1983). The impact of communications on the self-regulation of health beliefs, decisions, and behavior. Health Education Quarterly, 10, 3–29.CrossRef Leventhal, H., Safer, M. A., & Panagis, D. M. (1983). The impact of communications on the self-regulation of health beliefs, decisions, and behavior. Health Education Quarterly, 10, 3–29.CrossRef
Zurück zum Zitat Li, Y., Yazdanmehr, A., Wang, J., & Rao, H. R. (2019). Responding to identify theft: A victimization perspective. Decision Support Systems, 13–24. Li, Y., Yazdanmehr, A., Wang, J., & Rao, H. R. (2019). Responding to identify theft: A victimization perspective. Decision Support Systems, 13–24.
Zurück zum Zitat Li, Y., Yazdanmehr, A., Wang, J., & Rao, H. R. (2019). Responding to identity theft: A victimization perspective. Decision Support Systems, 121, 13–24 Li, Y., Yazdanmehr, A., Wang, J., & Rao, H. R. (2019). Responding to identity theft: A victimization perspective. Decision Support Systems, 121, 13–24
Zurück zum Zitat Liang, H. G., & Xue, Y. J. (2009). Avoidance of information technology threats: A theoretical perspective. MIS Quarterly, 33(1), 71–90.CrossRef Liang, H. G., & Xue, Y. J. (2009). Avoidance of information technology threats: A theoretical perspective. MIS Quarterly, 33(1), 71–90.CrossRef
Zurück zum Zitat MacKenzie, S., Podsakoff, P., & Podskoff, N. (2011). Construct measurement and validation procedures in MIS and behavioral research: Integrating new and existing techniques. MIS Quarterly, 35(2), 293–334.CrossRef MacKenzie, S., Podsakoff, P., & Podskoff, N. (2011). Construct measurement and validation procedures in MIS and behavioral research: Integrating new and existing techniques. MIS Quarterly, 35(2), 293–334.CrossRef
Zurück zum Zitat Marsh, H., Wen, Z., & Hau, K. (2006). Structural equation models of latent interaction and quadratic effects. In G. R. Hancock & R. O. Mueller (Eds.), Structural equation modeling: A second course (pp. 225–265). IAS. Marsh, H., Wen, Z., & Hau, K. (2006). Structural equation models of latent interaction and quadratic effects. In G. R. Hancock & R. O. Mueller (Eds.), Structural equation modeling: A second course (pp. 225–265). IAS.
Zurück zum Zitat Matejkovic, J. E., & Lahey, K. E. (2001). Identity theft: no help for consumers. Financial Services Review, 10(1-4), 221–235 Matejkovic, J. E., & Lahey, K. E. (2001). Identity theft: no help for consumers. Financial Services Review, 10(1-4), 221–235
Zurück zum Zitat McKnight, D. H., Choudhury, V., & Kacmar, C. (2002). Developing and validating trust measures for e-commerce: An integrative typology. Information Systems Research, 13(3), 334–359.CrossRef McKnight, D. H., Choudhury, V., & Kacmar, C. (2002). Developing and validating trust measures for e-commerce: An integrative typology. Information Systems Research, 13(3), 334–359.CrossRef
Zurück zum Zitat Menard, P., Bott, G., & Crossler, R. (2017). User motivations in protecting information security: Protection motivation theory versus self-determination theory. Journal of Management Information Systems, 34(4), 1203–1230.CrossRef Menard, P., Bott, G., & Crossler, R. (2017). User motivations in protecting information security: Protection motivation theory versus self-determination theory. Journal of Management Information Systems, 34(4), 1203–1230.CrossRef
Zurück zum Zitat Mitchison, N. et al. (2004). Identity theft — a discussion paper. Technical Report EUR 21098 EN, European Commission — Joint Research Center Mitchison, N. et al. (2004). Identity theft — a discussion paper. Technical Report EUR 21098 EN, European Commission — Joint Research Center
Zurück zum Zitat Park, C., Im, G., & Keil, M. (2008). Overcoming the mum effect in IT project reporting: Impacts of fault responsibility and time urgency. Journal of the Association for Information Systems, 9(7), 409–431.CrossRef Park, C., Im, G., & Keil, M. (2008). Overcoming the mum effect in IT project reporting: Impacts of fault responsibility and time urgency. Journal of the Association for Information Systems, 9(7), 409–431.CrossRef
Zurück zum Zitat Pastrikos, C. (2004). Identity theft statutes: which will protect americans the most? Albany Law Review, 67, 1137–1157 Pastrikos, C. (2004). Identity theft statutes: which will protect americans the most? Albany Law Review, 67, 1137–1157
Zurück zum Zitat Paulus, D. (1983). Sphere-specific measures of perceived control. Journal of Personality and Social Psychology, 44(6), 1253–1265.CrossRef Paulus, D. (1983). Sphere-specific measures of perceived control. Journal of Personality and Social Psychology, 44(6), 1253–1265.CrossRef
Zurück zum Zitat Qahri-Saremi, H., & Turel, O. (2020). Ambivalence and coping responses in post-adoptive information systems use. Journal of Management Information Systems, 37(3), 820–848.CrossRef Qahri-Saremi, H., & Turel, O. (2020). Ambivalence and coping responses in post-adoptive information systems use. Journal of Management Information Systems, 37(3), 820–848.CrossRef
Zurück zum Zitat Rogers, R. W. (1975). A protection motivation theory of fear appeals: Negative and positive persuasive appeals to health and self-esteem. Journal of Applied Social Psychology, 91(1), 93–114. Rogers, R. W. (1975). A protection motivation theory of fear appeals: Negative and positive persuasive appeals to health and self-esteem. Journal of Applied Social Psychology, 91(1), 93–114.
Zurück zum Zitat Rogers, R. W. (1983a). Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation. In J. Cacioppo & R. Petty (Eds.), Social Psychophysiology. Guilford Press Rogers, R. W. (1983a). Cognitive and physiological processes in fear appeals and attitude change: A revised theory of protection motivation. In J. Cacioppo & R. Petty (Eds.), Social Psychophysiology. Guilford Press
Zurück zum Zitat Rogers, R. W. (1983b). Cognitive and physiological processes in fear-based attitude change: A revised theory of fear appeals and attitude change. Social psychophysiology: A sourcebook, 153–176 Rogers, R. W. (1983b). Cognitive and physiological processes in fear-based attitude change: A revised theory of fear appeals and attitude change. Social psychophysiology: A sourcebook, 153–176
Zurück zum Zitat Schuetz, S., Lowry, P., Pienta, D., & Thatcher, J. (2020). Effectiveness of abstract versus concrete fear appeals in information security. Journal of Management Information Systems, 37(3), 723–757.CrossRef Schuetz, S., Lowry, P., Pienta, D., & Thatcher, J. (2020). Effectiveness of abstract versus concrete fear appeals in information security. Journal of Management Information Systems, 37(3), 723–757.CrossRef
Zurück zum Zitat Schwab, D. P. (1980). Construct validity in organizational behavior. In B. M. Staw & L. L. Cummings (Eds.), Research in Organizational Behavior (Vol. 2, pp. 3–43). JAI Press. Schwab, D. P. (1980). Construct validity in organizational behavior. In B. M. Staw & L. L. Cummings (Eds.), Research in Organizational Behavior (Vol. 2, pp. 3–43). JAI Press.
Zurück zum Zitat Walsh, G., Shiu, E., Hassan, L., Hille, P., & Takahashi, I. (2019). Fear of online consumer identity theft: Cross-country application and short scale development. Information Systems Frontiers, 21(6), 1251–1264.CrossRef Walsh, G., Shiu, E., Hassan, L., Hille, P., & Takahashi, I. (2019). Fear of online consumer identity theft: Cross-country application and short scale development. Information Systems Frontiers, 21(6), 1251–1264.CrossRef
Zurück zum Zitat Weinstein, N. D. (1993). Testing four competing theories of health-protective behavior. Health Psychology, 12(4), 324–333.CrossRef Weinstein, N. D. (1993). Testing four competing theories of health-protective behavior. Health Psychology, 12(4), 324–333.CrossRef
Metadaten
Titel
Online Users’ Identity Theft and Coping Strategies, Attribution and Sense of Urgency: A Non-Linear Quadratic Effect Assessment
verfasst von
A. F. Salam
Hua Dai
Lei Wang
Publikationsdatum
23.10.2021
Verlag
Springer US
Erschienen in
Information Systems Frontiers / Ausgabe 6/2022
Print ISSN: 1387-3326
Elektronische ISSN: 1572-9419
DOI
https://doi.org/10.1007/s10796-021-10194-w

Weitere Artikel der Ausgabe 6/2022

Information Systems Frontiers 6/2022 Zur Ausgabe

Premium Partner