From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Internalization of Gender Roles: Challenges for Female CIOs in Ensuring IT Security Compliance., и . AMCIS, Association for Information Systems, (2023)Developing Multidimensional Scale for measuring Social Media Habit: A Nomological Examination in the Context of Cyberbullying., и . AMCIS, Association for Information Systems, (2021)Using EDCA to improve vehicle safety messaging., , , и . VNC, стр. 70-77. IEEE, (2012)Security Concerns in the Nomological Network of Trust and Big 5: First Order Vs. Second Order.. ICIS, Association for Information Systems, (2011)Trading Trust for Discount: Does Frugality Moderate the Impact of Privacy and Security Concerns?, и . AMCIS, стр. 417. Association for Information Systems, (2010)Trust Drops when Insiders Drop the Ball: The Role of Age, Gender, and Privacy Concern in Insider Data Breaches.. AMCIS, Association for Information Systems, (2017)Interaction Effect of Gender and Neutralization Techniques on Information Security Policy Compliance: An Ethical Perspective., и . AMCIS, Association for Information Systems, (2016)Collaborative Perception for Automated Vehicles Leveraging Vehicle-to-Vehicle Communications., , , и . Intelligent Vehicles Symposium, стр. 1099-1106. IEEE, (2018)Joint Sensing and Power Loading Algorithms for OFDM-Based Cognitive Radio Systems., , и . WCNC, стр. 1-5. IEEE, (2010)Comparing LIMERIC and DCC approaches for VANET channel congestion control., , , , , и . WiVeC, стр. 1-7. IEEE, (2014)