Author of the publication

A Semantic Analysis of Security Policy Formulation and Implementation: A Case Study.

, and . AMCIS, page 166. Association for Information Systems, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Semiotic Analysis of Knowledge Intensive Business Processes: Developing Interpretations for Sustainable Competitive Advantage., and . AMCIS, page 389. Association for Information Systems, (2005)Developing A Networked Authority: Nature and Significance of Power Relationships., , and . ECIS, page 511-525. Cork Publishing Ltd, (1997)Factors Affecting the Use and Adoption of EDI in Manufacturing SMEs: Experiences From Portugal., and . ECIS, page 1184-1190. Cork Publishing Ltd, (1997)Panel: Developing An Ethical Agenda for A Networked Workplace., , , , and . ECIS, page 1535-1536. Cork Publishing Ltd, (1997)Electronic thesaurus for clinical terms: A methodological approach., and . ECIS, page 591-600. (1995)Developing Integrated Solutions in the Health Care Environment: A Case Study., and . ECIS, page 1163-1172. (1996)A Semantic Analysis of Security Policy Formulation and Implementation: A Case Study., and . AMCIS, page 166. Association for Information Systems, (2006)What Interrupts Intention to Comply with IS-Security Policy?, and . AMCIS, Association for Information Systems, (2016)Investigating Continuous Security Compliance Behavior: Insights from Information Systems Continuance Model., , and . AMCIS, Association for Information Systems, (2016)Using Actor Network Theory to Understand Information Security Management., , and . SEC, volume 330 of IFIP Advances in Information and Communication Technology, page 43-54. Springer, (2010)