Author of the publication

Healthcare in Fraudster's Crosshairs: Designing, Implementing and Evaluating a Machine Learning Approach for Anomaly Detection on Medical Prescription Claim Data.

, , , and . PACIS, page 89. (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Impact of Threat and Efficacy on Information Security Behavior: Applying an Extended Parallel Process Model to the Fear of Ransomware., , , and . HICSS, page 1-10. ScholarSpace, (2021)Introduction to the Minitrack on Security and Privacy Challenges for Healthcare., , , and . HICSS, page 3717-3718. ScholarSpace, (2024)Data Size Matters: The Impact of Message Framing in Different Health Scenarios on the Donation of Personal Health Information., , , and . HICSS, page 3245-3254. ScholarSpace, (2024)Custom Solutions for Diverse Needs: Laying the Foundation for Tailored SETA Programs in the Healthcare Domain., , , , , , and . HICSS, page 3719-3728. ScholarSpace, (2024)(I Can't Get No) Electrification - A Qualitative-Empirical Study on Electrification of Transportation Fleets., , , , and . ICIS, Association for Information Systems, (2021)Overcoming Digital Challenges: A Cross-Cultural Experimental Investigation of Recovering from Data Breaches., , , and . ICIS, Association for Information Systems, (2020)The More, the Better? Compensation and Remorse as Data Breach Recovery Actions - An Experimental Scenario-based Investigation., , and . Wirtschaftsinformatik (Zentrale Tracks), page 1278-1293. GITO Verlag, (2020)The Role of Uncertainty in Data Breach Response Processes - A Reactance Theory Perspective., , , , and . ICIS, Association for Information Systems, (2022)A Double-Edged Sword of Involvement: On the Tension Between Customers' Group Value and Self-Interest in Data Breach Response Processes., , , and . ICIS, Association for Information Systems, (2022)Bridging the Gap between Security Competencies and Security Threats: Toward a Cyber Security Domain Model., , , , , , and . HICSS, page 6118-6127. ScholarSpace, (2023)