Author of the publication

Online Health Communities the Impact of Social Support on the Health State of People with Chronic Illness.

, , , , and . ICSH, volume 10347 of Lecture Notes in Computer Science, page 184-188. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Creating a Taxonomy for Mobile Commerce Innovations Using Social Network and Cluster Analyses., , and . Int. J. Electron. Commer., 16 (4): 19-52 (2012)Cyberloafing in the workplace: mitigation tactics and their impact on individuals' behavior., , , and . Inf. Technol. Manag., 19 (4): 197-215 (2018)Human Error and Privacy Breaches in Healthcare Organizations: Causes and Management Strategies., , , and . AMCIS, page 406. Association for Information Systems, (2009)Acceptance, Use, and Influence of Political Technologies among Youth Voters in the 2008 US Presidential Election., , and . IJEP, 1 (4): 1-21 (2010)Privacy and E-Authentication: The Dangers of Self-disclosure in Social Networks., and . WEB, volume 52 of Lecture Notes in Business Information Processing, page 166-176. Springer, (2009)Online Health Communities the Impact of Social Support on the Health State of People with Chronic Illness., , , , and . ICSH, volume 10347 of Lecture Notes in Computer Science, page 184-188. Springer, (2017)Predicting stock market returns from malicious attacks: A comparative analysis of vector autoregression and time-delayed neural networks., and . Decis. Support Syst., 51 (4): 745-759 (2011)HIPAA Privacy Rule compliance: An interpretive study using Norman's action theory., , , and . Comput. Secur., 31 (2): 206-220 (2012)Impact of HIPAA provisions on the stock market value of healthcare institutions, and information security and other information technology firms., , , and . Comput. Secur., 31 (6): 750-770 (2012)How significant is human error as a cause of privacy breaches? An empirical study and a framework for error management., , and . Comput. Secur., 28 (3-4): 215-228 (2009)