Author of the publication

Implications of Monitoring Mechanisms on Bring Your Own Device (BYOD) Adoption.

, , and . ICIS, Association for Information Systems, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Understanding Compliance with Bring Your Own Device Policies Utilizing Protection Motivation Theory: Bridging the Intention-Behavior Gap., , , and . J. Inf. Syst., 28 (1): 209-226 (2014)Regulatory Focus in the Context of Wearable Continuance., , and . AMCIS, Association for Information Systems, (2019)A Review on Consumer Health Information Technology Research in IS., , and . HICSS, page 1-10. ScholarSpace, (2020)The Quest for Complete Security Protection: An Empirical Analysis of an Individual's 360 Degree Protection from File and Data Loss., and . AMCIS, Association for Information Systems, (2012)Information Security Compliance: A Complete Values View., and . AMCIS, Association for Information Systems, (2019)Establishing Election Integrity Online: The Role of Auditor Source Credibility in Voter Believability of Election Results., , and . AMCIS, Association for Information Systems, (2021)InfoSec Process Action Model (IPAM): Targeting Insiders' Weak Password Behavior., , , and . J. Inf. Syst., 33 (3): 201-225 (2019)Why social media users share private images: Ignorance or Social Reward., and . AMCIS, Association for Information Systems, (2019)Implications of Monitoring Mechanisms on Bring Your Own Device (BYOD) Adoption., , and . ICIS, Association for Information Systems, (2013)The Compromise of One's Personal Information: Trait Affect as an Antecedent in Explaining the Behavior of Individuals., and . HICSS, page 1-10. ScholarSpace, (2019)