Autor der Publikation

Bitte wählen Sie eine Person um die Publikation zuzuordnen

Um zwischen Personen mit demselben Namen zu unterscheiden, wird der akademische Grad und der Titel einer wichtigen Publikation angezeigt. Zudem lassen sich über den Button neben dem Namen einige der Person bereits zugeordnete Publikationen anzeigen.

 

Weitere Publikationen von Autoren mit dem selben Namen

Improving the Usability Evaluation Technique, Heuristic Evaluation, through the Use of Collaborative Software., und . AMCIS, Seite 284. Association for Information Systems, (2003)Understanding the Disclosure of Private Healthcare Information within Online Quantified Self 2.0 Platforms., , , und . PACIS, Seite 140. (2015)Proposing the control-reactance compliance model (CRCM) to explain opposing motivations to comply with organisational information security policies., und . Inf. Syst. J., 25 (5): 433-463 (2015)Cognitive-affective drivers of employees' daily compliance with information security policies: A multilevel, longitudinal study., und . Inf. Syst. J., 29 (1): 43-69 (2019)Leveraging fairness and reactance theories to deter reactive computer abuse following enhanced organisational information security policies: an empirical study of the influence of counterfactual reasoning and organisational trust., , , und . Inf. Syst. J., 25 (3): 193-273 (2015)The Drivers in the Use of Online Whistle-Blowing Reporting Systems., , , und . J. Manag. Inf. Syst., 30 (1): 153-190 (2013)Autonomous Scientifically Controlled Screening Systems for Detecting Information Purposely Concealed by Individuals., , , und . J. Manag. Inf. Syst., 31 (3): 106-137 (2014)An Integrative Theory Addressing Cyberharassment in the Light of Technology-Based Opportunism., , , , , und . J. Manag. Inf. Syst., 36 (4): 1142-1178 (2019)The CMC Interactivity Model: How Interactivity Enhances Communication Quality and Process Satisfaction in Lean-Media Groups., , , und . J. Manag. Inf. Syst., 26 (1): 155-195 (2009)Breaking Bad in Cyberspace: Understanding why and how Black Hat Hackers Manage their Nerves to Commit their Virtual Crimes., und . Inf. Syst. Frontiers, 23 (2): 329-341 (2021)