Author of the publication

From liking to not liking: A proposed experiment design to explore consumer perceptions of health wearable notifications.

, , , and . ACIS, page 60. (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Risk Perspectives in Systems Development., , , and . AMCIS, page 273. Association for Information Systems, (2007)Personality and IT security: An application of the five-factor model., , , and . AMCIS, page 415. Association for Information Systems, (2006)The influence of the informal social learning environment on information privacy policy compliance efficacy and intention., , and . Eur. J. Inf. Syst., 20 (3): 267-284 (2011)The Future of Information Systems in a Post-COVID World by TC8 (Information Systems)., , , , , , , , , and 8 other author(s). IFIP's Exciting First 60+ Years, volume 600 of IFIP Advances in Information and Communication Technology, Springer, (2021)The Role of Perceptions of Organizational Injustice and Techniques of Neutralization in Forming Computer Abuse Intentions., , and . AMCIS, Association for Information Systems, (2011)The Impact of National Culture on Workplace Privacy Expectations in the Context of Information Security Assurance., , and . AMCIS, page 521. Association for Information Systems, (2009)Smart Pay-As-You-Live Services in Healthcare: A Balance Theory Perspective., , and . ICIS, Association for Information Systems, (2021)Introduction to Innovative Behavioral IS Security and Privacy Research Minitrack., , and . HICSS, page 1. ScholarSpace / AIS Electronic Library (AISeL), (2017)A Broader View of Perceived Risk during Internet Transactions., , and . Commun. Assoc. Inf. Syst., (2016)Information security management objectives and practices: a parsimonious framework., , and . Inf. Manag. Comput. Secur., 16 (3): 251-270 (2008)