Author of the publication

Taking a Seat at the Table: The Quest for CISO Legitimacy.

, , and . ICIS, Association for Information Systems, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Integrating Facial Cues of Threat into Security Warnings - An fMRI and Field Study., , , , and . AMCIS, Association for Information Systems, (2016)MetaFraud: A Meta-Learning Framework for Detecting Financial Fraud., , , and . MIS Q., 36 (4): 1293-1327 (2012)Neutralization: New Insights into the Problem of Employee Systems Security Policy Violations., and . MIS Q., 34 (3): 487-502 (2010)Neural correlates of gender differences and color in distinguishing security warnings and legitimate websites: a neurosecurity study., , , , and . J. Cybersecur., 1 (1): 109-120 (2015)Measuring Electronic Commerce Technology-Enabled Business Value: An Empirical Investigation., , , and . J. Organ. Comput. Electron. Commer., 22 (3): 256-279 (2012)The Differential Role of Alternative Data in SME-Focused Fintech Lending., , , and . ICIS, Association for Information Systems, (2020)Introduction to the Minitrack on Innovative Behavioral IS Security and Privacy Research., , and . HICSS, page 1. ScholarSpace, (2019)Introduction to Innovative Behavioral IS Security and Privacy Research Minitrack., , and . HICSS, page 3148. IEEE Computer Society, (2014)How Polymorphic Warnings Reduce Habituation in the Brain: Insights from an fMRI Study., , , , , and . CHI, page 2883-2892. ACM, (2015)The Fog of Warnings: How Non-essential Notifications Blur with Security Warnings., , , , and . SOUPS @ USENIX Security Symposium, USENIX Association, (2019)