Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Phishing Attacks Over Time: A Longitudinal Study., and . AMCIS, Association for Information Systems, (2015)Corporate wiki users: results of a survey., , and . Int. Sym. Wikis, page 99-104. ACM, (2006)Corporate wiki users, , and . page 99. ACM Press, New York, New York, USA, (2006)Factors affecting shapers of organizational wikis., , and . J. Assoc. Inf. Sci. Technol., 61 (3): 543-554 (2010)Information System Ethical Attitudes: A Cultural Comparison of the United States, Spain, and Portugal., , , and . AMCIS, page 234. Association for Information Systems, (2010)Emergency knowledge management and social media technologies: A case study of the 2010 Haitian earthquake., and . ASIST, volume 47 of Proc. Assoc. Inf. Sci. Technol., page 1-9. Wiley, (2010)The use of cookies in Federal agency web sites: Privacy and recordkeeping issues., and . Gov. Inf. Q., 27 (3): 231-237 (2010)Emergency knowledge management and social media technologies: A case study of the 2010 Haitian earthquake., and . Int. J. Inf. Manag., 31 (1): 6-13 (2011)Connecting the Dots: When Personal Information Becomes Personally Identifying on the Internet., , and . ICWSM, The AAAI Press, (2010)The Impact of Shaping on Knowledge Reuse for Organizational Improvement with Wikis., , and . MIS Q., 37 (2): 455-469 (2013)