Next Article in Journal
Requirements for Crafting Virtual Network Packet Captures
Next Article in Special Issue
Addressing Human Factors in Cybersecurity Leadership
Previous Article in Journal
A Game or Notes? The Use of a Customized Mobile Game to Improve Teenagers’ Phishing Knowledge, Case of Tanzania
Previous Article in Special Issue
Checked and Approved? Human Resources Managers’ Uses of Social Media for Cybervetting
 
 
Article

Article Versions Notes

J. Cybersecur. Priv. 2022, 2(3), 490-515; https://doi.org/10.3390/jcp2030025
Action Date Notes Link
article xml file uploaded 28 June 2022 13:41 CEST Original file -
article xml uploaded. 28 June 2022 13:41 CEST Update https://www.mdpi.com/2624-800X/2/3/25/xml
article pdf uploaded. 28 June 2022 13:41 CEST Version of Record https://www.mdpi.com/2624-800X/2/3/25/pdf
article html file updated 28 June 2022 13:43 CEST Original file -
article html file updated 12 August 2022 22:58 CEST Update https://www.mdpi.com/2624-800X/2/3/25/html
Back to TopTop