Autor der Publikation

Seeing the forest and the trees: A meta-analysis of information security policy compliance literature.

, , und . HICSS, Seite 1-10. ScholarSpace / AIS Electronic Library (AISeL), (2017)

Bitte wählen Sie eine Person um die Publikation zuzuordnen

Um zwischen Personen mit demselben Namen zu unterscheiden, wird der akademische Grad und der Titel einer wichtigen Publikation angezeigt. Zudem lassen sich über den Button neben dem Namen einige der Person bereits zugeordnete Publikationen anzeigen.

 

Weitere Publikationen von Autoren mit dem selben Namen

Seeing the forest and the trees: A meta-analysis of information security policy compliance literature., , und . HICSS, Seite 1-10. ScholarSpace / AIS Electronic Library (AISeL), (2017)Regulatory Facilitators and Impediments Impacting Cybersecurity Maturity., und . AMCIS, Association for Information Systems, (2022)Seeing the Forest and the Trees: A Meta-Analysis of the Antecedents to Information Security Policy Compliance., , und . MIS Q., (2019)A Systems Approach to Countermeasures in Credibility Assessment Interviews., , , und . ICIS, Association for Information Systems, (2013)Improving Password Cybersecurity Through Inexpensive and Minimally Invasive Means: Detecting and Deterring Password Reuse Through Keystroke-Dynamics Monitoring and Just-in-Time Fear Appeals., , , und . Inf. Technol. Dev., 20 (2): 196-213 (2014)Man vs. machine: Investigating the effects of adversarial system use on end-user behavior in automated deception detection interviews., , und . Decis. Support Syst., (2016)Evaluating the Feasibility of Using Noncontact Sensors to Conduct a Targetless Concealed Information Test.. EISIC, Seite 269-272. IEEE, (2013)Deception is in the eye of the communicator: Investigating pupil diameter variations in automated deception detection interviews., , , und . ISI, Seite 97-102. IEEE, (2015)Saving Face on Facebook: Privacy Concerns, Social Benefits, and Impression Management., , und . ICIS, Association for Information Systems, (2014)Mitigating Threats to Collaboration and CMC: Identifying Antecedents of Online Deviance., , und . HICSS, Seite 325-334. IEEE Computer Society, (2013)