Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

When Training Gets Trumped: How dual-Task interference inhibits Security Training., , , and . ECIS, page Research Paper 163. (2016)What Do We Really Know about How Habituation to Warnings Occurs Over Time?: A Longitudinal fMRI Study of Habituation and Polymorphic Warnings., , , , and . CHI, page 2215-2227. ACM, (2017)Using Measures of Risk Perception to Predict Information Security Behavior: Insights from Electroencephalography (EEG)., , , and . J. Assoc. Inf. Syst., 15 (10): 2 (2014)The Value of Distrust in Computer-Based Decision-Making Groups., , , , , , and . HICSS, page 1-10. IEEE Computer Society, (2010)Improving Security Message Adherence through Improved Comprehension: Neural and Behavioral Insights., , , , and . AMCIS, Association for Information Systems, (2018)Neural correlates of gender differences and color in distinguishing security warnings and legitimate websites: a neurosecurity study., , , , and . J. Cybersecur., 1 (1): 109-120 (2015)The Impact of Technostress on Users' Responses to Security Warnings: A NeuroIS Study., , , , and . AMCIS, Association for Information Systems, (2015)Barriers to a cybersecurity career: Analysis across career stage and gender., , , , , , and . Comput. Secur., (September 2023)Dependability Auditing with Model Checking., , and . AMCIS, page 276. Association for Information Systems, (2005)How Polymorphic Warnings Reduce Habituation in the Brain: Insights from an fMRI Study., , , , , and . CHI, page 2883-2892. ACM, (2015)