From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Seeing the forest and the trees: A meta-analysis of information security policy compliance literature., , и . HICSS, стр. 1-10. ScholarSpace / AIS Electronic Library (AISeL), (2017)Seeing the Forest and the Trees: A Meta-Analysis of the Antecedents to Information Security Policy Compliance., , и . MIS Q., (2019)Regulatory Facilitators and Impediments Impacting Cybersecurity Maturity., и . AMCIS, Association for Information Systems, (2022)Sleight of Hand: Identifying Concealed Information by Monitoring Mouse-Cursor Movements., , , , и . J. Assoc. Inf. Syst., 20 (1): 3 (2019)A Systems Approach to Countermeasures in Credibility Assessment Interviews., , , и . ICIS, Association for Information Systems, (2013)Too Busy to Be Manipulated: How Multitasking with Technology Improves Deception Detection in Collaborative Teamwork., , , , , и . J. Manag. Inf. Syst., 37 (2): 377-395 (2020)Man vs. machine: Investigating the effects of adversarial system use on end-user behavior in automated deception detection interviews., , и . Decis. Support Syst., (2016)Improving Password Cybersecurity Through Inexpensive and Minimally Invasive Means: Detecting and Deterring Password Reuse Through Keystroke-Dynamics Monitoring and Just-in-Time Fear Appeals., , , и . Inf. Technol. Dev., 20 (2): 196-213 (2014)When Disclosure is Involuntary: Empowering Users with Control to Reduce Concerns., , , и . ICIS, Association for Information Systems, (2015)Saving Face on Facebook: Privacy Concerns, Social Benefits, and Impression Management., , и . ICIS, Association for Information Systems, (2014)