Taherdoost, Hamed - In: Information & Computer Security 25 (2017) 5, pp. 535-559
to develop a new model to help e-service practitioners and researchers in the evaluation of e-service security and its … implemented based on end-users’ perception. Afterward, a hierarchical structure of e-service security is established to calculate …