From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Extending Ecommerce Deception Theory to Phishing., , и . ICIS, Association for Information Systems, (2014)Revisiting the Impact of System Use on Task Performance: An Exploitative-Explorative System Use Framework., , и . J. AIS, 20 (4): 3 (2019)Understanding online customers' ties to merchants: the moderating influence of trust on the relationship between switching costs and e-loyalty., , , и . Eur. J. Inf. Syst., 23 (2): 185-204 (2014)AMCIS 2021 Awards and Closing Ceremony., , , , , , , , , и . AMCIS, Association for Information Systems, (2021)Social Media and Emergency Management: Exploring State and Local Tweets., , и . HICSS, стр. 1968-1977. IEEE Computer Society, (2014)Using susceptibility claims to motivate behaviour change in IT security., , и . Eur. J. Inf. Syst., 30 (1): 27-45 (2021)Operationalizing Multidimensional Constructs in Structural Equation Modeling: Recommendations for IS Research., , , и . Commun. Assoc. Inf. Syst., (2012)IS 2009: Changing the Course for Undergraduate IS Model Curricula., , , , , , , и . ICIS, стр. 149. Association for Information Systems, (2009)Revising the IS Model Curriculum: Rethinking the Approach and the Process., , , , , , и . Commun. Assoc. Inf. Syst., (2007)ICIS 2021 Keynote II & Paper Awards Ceremony., , , , , и . ICIS, Association for Information Systems, (2021)