Author of the publication

Seeing the forest and the trees: A meta-analysis of information security policy compliance literature.

, , and . HICSS, page 1-10. ScholarSpace / AIS Electronic Library (AISeL), (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Seeing the forest and the trees: A meta-analysis of information security policy compliance literature., , and . HICSS, page 1-10. ScholarSpace / AIS Electronic Library (AISeL), (2017)Seeing the Forest and the Trees: A Meta-Analysis of the Antecedents to Information Security Policy Compliance., , and . MIS Q., (2019)Regulatory Facilitators and Impediments Impacting Cybersecurity Maturity., and . AMCIS, Association for Information Systems, (2022)A Systems Approach to Countermeasures in Credibility Assessment Interviews., , , and . ICIS, Association for Information Systems, (2013)Man vs. machine: Investigating the effects of adversarial system use on end-user behavior in automated deception detection interviews., , and . Decis. Support Syst., (2016)Improving Password Cybersecurity Through Inexpensive and Minimally Invasive Means: Detecting and Deterring Password Reuse Through Keystroke-Dynamics Monitoring and Just-in-Time Fear Appeals., , , and . Inf. Technol. Dev., 20 (2): 196-213 (2014)Deception is in the eye of the communicator: Investigating pupil diameter variations in automated deception detection interviews., , , and . ISI, page 97-102. IEEE, (2015)Saving Face on Facebook: Privacy Concerns, Social Benefits, and Impression Management., , and . ICIS, Association for Information Systems, (2014)Evaluating the Feasibility of Using Noncontact Sensors to Conduct a Targetless Concealed Information Test.. EISIC, page 269-272. IEEE, (2013)Mitigating Threats to Collaboration and CMC: Identifying Antecedents of Online Deviance., , and . HICSS, page 325-334. IEEE Computer Society, (2013)