Author of the publication

Using Trace Ethnography to Compare Perceived Cyber-Threats of IT to Non-IT Professionals.

, , and . AMCIS, Association for Information Systems, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Exploring An Individual's Intention to Use Blogs: The Roles of Social, Motivational and Individual Factors., , and . PACIS, page 161. AISeL, (2010)A new perspective on Twitter hashtag use: Diffusion of innovation theory.. ASIST, volume 47 of Proc. Assoc. Inf. Sci. Technol., page 1-4. Wiley, (2010)Unfolding Research Data Services: An Information Architecture Perspective., , and . JCDL, page 353-354. ACM, (2018)Using Trace Ethnography to Compare Perceived Cyber-Threats of IT to Non-IT Professionals., , and . AMCIS, Association for Information Systems, (2016)Getting Smarter: Definition, Scope, and Implications of Smart Libraries., and . JCDL, page 403-404. ACM, (2018)E-Memory Choice Architecture: Modeling the Use Diffusion of Twitter Archiving System., and . Int. J. Online Mark., 9 (1): 24-37 (2019)Emotion barometer of reading: user interface design of a social cataloging website.. CHI Extended Abstracts, page 3371-3376. ACM, (2009)The current state of data governance in higher education., and . ASIST, volume 55 of Proc. Assoc. Inf. Sci. Technol., page 198-206. Wiley, (2018)Decomposing the Twitter data stream in healthcare: An information theory perspective., and . ASIST, volume 54 of Proc. Assoc. Inf. Sci. Technol., page 853-854. Wiley, (2017)No Cue, No Clue? Understanding Information Interaction in Social Bookmarking Services., and . ITNG, page 867-872. IEEE Computer Society, (2011)