Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Individual's Views of the Right to Privacy of Other Individuals, Companies, and Governments: A Theoretical Perspective., , and . AMCIS, Association for Information Systems, (2014)Training Future Cybersecurity Professionals in Spear Phishing using SiEVE., , , and . SIGITE, page 135-140. ACM, (2018)Mental models and expectation violations in conversational AI interactions., , and . Decis. Support Syst., (2021)The Abacus: A New Architecture for Policy-based Authorization., and . HICSS, page 1-10. ScholarSpace, (2021)An Investigation of Conversational Agent Relevance, Presence, and Engagement., , and . AMCIS, Association for Information Systems, (2018)Breaking out of the Design Science Box: High-Value Impact Through Multidisciplinary Design Science Programs of Research., , and . AMCIS, Association for Information Systems, (2013)Designing Authentic Cybersecurity Learning Experiences: Lessons from the Cybermatics Playable Case Study., , , , , , and . HICSS, page 1-10. ScholarSpace, (2019)User Acceptance of Knowledge-Based System Recommendations: Explanations, Arguments, and Fit-Research in Progress., , and . HICSS, page 3719-3727. IEEE Computer Society, (2012)The Value of Distrust in Computer-Based Decision-Making Groups., , , , , , and . HICSS, page 1-10. IEEE Computer Society, (2010)Theory of Experiential Career Exploration Technology (TECET): Increasing cybersecurity career interest through playable case studies., , , , , , and . HICSS, page 1-10. ScholarSpace, (2019)