Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The impact of adoption of identity theft countermeasures on firm value., and . Decis. Support Syst., 55 (3): 753-763 (2013)Understanding Security Vulnerability Awareness, Firm Incentives, and ICT Development in Pan-Asia., , , , , and . J. Manag. Inf. Syst., 37 (3): 668-693 (2020)A Framework for Assessment of Anti-phishing Preparedness., and . IMECS, page 1020-1025. Newswood Limited, (2007)Network Analysis of Search Dynamics: The Case of Stock Habitats., , , and . Manag. Sci., 63 (8): 2667-2687 (2017)The Impact of Subscription Programs on Customer Behavior: Evidence from a Mobile Commerce Retailer., , , and . PACIS, page 185. (2023)Indirect Financial Loss of Phishing to Global Market., and . ICIS, page 5. Association for Information Systems, (2008)Phishing is here: Are we ready., and . IMECS, page 990-990. Newswood Limited, (2006)Network Analysis to Uncover Stock comovement from a Chinese Financial Portal., , , and . PACIS, page 302. (2016)Can Touch Interaction Predict Product-Related Emotion? A Study on Mobile Augmented Reality., , , and . AMCIS, Association for Information Systems, (2020)A Study of Search Attention and Stock Returns Cross Predictability., , , and . AMCIS, Association for Information Systems, (2015)