From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Integrating Facial Cues of Threat into Security Warnings - An fMRI and Field Study., , , , и . AMCIS, Association for Information Systems, (2016)MetaFraud: A Meta-Learning Framework for Detecting Financial Fraud., , , и . MIS Q., 36 (4): 1293-1327 (2012)Neutralization: New Insights into the Problem of Employee Systems Security Policy Violations., и . MIS Q., 34 (3): 487-502 (2010)Neural correlates of gender differences and color in distinguishing security warnings and legitimate websites: a neurosecurity study., , , , и . J. Cybersecur., 1 (1): 109-120 (2015)Measuring Electronic Commerce Technology-Enabled Business Value: An Empirical Investigation., , , и . J. Organ. Comput. Electron. Commer., 22 (3): 256-279 (2012)The Differential Role of Alternative Data in SME-Focused Fintech Lending., , , и . ICIS, Association for Information Systems, (2020)Introduction to the Minitrack on Innovative Behavioral IS Security and Privacy Research., , и . HICSS, стр. 1. ScholarSpace, (2019)Introduction to Innovative Behavioral IS Security and Privacy Research Minitrack., , и . HICSS, стр. 3148. IEEE Computer Society, (2014)Testing the Potential of RFID to Increase Supply-Chain Agility and to Mitigate the Bullwhip Effect., , и . Int. J. Appl. Logist., 1 (1): 48-66 (2010)Can individuals' neutralization techniques be overcome? A field experiment on password policy., , и . Comput. Secur., (2020)