From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Patient Health Information Search: An Exploratory Model of Web-based Search Behavior., , и . JOEUC, 15 (4): 49-61 (2003)Developing Measurement Scales for Passwords Uniqueness and Secrecy., и . AMCIS, Association for Information Systems, (2017)Sustained Secure Behavior and the Role of Self-Efficacy., и . ICIS, Association for Information Systems, (2018)User Interaction with Healthcare Information Systems: Do Healthcare Professionals Want to Comply with HIPAA?, , и . AMCIS, стр. 326. Association for Information Systems, (2006)Analysis of systems development project risks: an integrative framework., , , и . DATA BASE, 40 (2): 8-27 (2009)Can financial incentives help with the struggle for security policy compliance?, , , и . Inf. Manag., 58 (4): 103447 (2021)The effects of knowledge mechanisms on employees' information security threat construal., , и . Inf. Syst. J., 33 (4): 790-841 (июля 2023)Do You Still Trust?: The Role of Age, Gender, and Privacy Concern on Trust after Insider Data Breaches., и . Data Base, 52 (4): 9-44 (2021)Leader's dilemma game: An experimental design for cyber insider threat research., и . Inf. Syst. Frontiers, 19 (2): 377-396 (2017)Adaptive and maladaptive factors behind password manager use: A hope-extended protection motivation perspective., , и . Comput. Secur., (2024)