From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Seeing the Forest and the Trees: A Meta-Analysis of the Antecedents to Information Security Policy Compliance., , и . MIS Q., (2019)Capabilities and Skill Configurations of Information Security Incident Responders., , , и . HICSS, стр. 1-10. ScholarSpace / AIS Electronic Library (AISeL), (2017)The Role of Individual Characteristics on the Effectiveness of IS Security Countermeasures., и . AMCIS, стр. 176. Association for Information Systems, (2004)Managing Security in Organizations: Adoption of Information Security Solutions., , и . SIGMIS-CPR, стр. 87-88. ACM, (2017)The Impact of Virus Attack Announcements on the Market Value of Firms., и . WOSIS, стр. 146-156. INSTICC Press, (2004)A DevOps Perspective: the Impact of Role Transitions on Software Security Continuity., и . ECIS, (2023)Seeing the forest and the trees: A meta-analysis of information security policy compliance literature., , и . HICSS, стр. 1-10. ScholarSpace / AIS Electronic Library (AISeL), (2017)Time Will Tell: The Case for an Idiographic Approach to Behavioral Cybersecurity Research., , и . MIS Q., 48 (1): 95-136 (2024)Does Security Impact E-procurement Performance? Testing a Model of Direct and Moderated Effects., , и . Decis. Sci., 43 (3): 437-458 (2012)'Breaching' Auditor Judgments of Information Security Effectiveness., и . ICIS, Association for Information Systems, (2014)