Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Beyond Security and Privacy Perception: An Approach to Biometric Authentication Perception Change., and . AMCIS, Association for Information Systems, (2015)Top Manager's Perspectives on Cyberinsurance Risk Management for Reducing Cybersecurity Risks., , and . AMCIS, Association for Information Systems, (2016)Examining Trends of Technology Diffusion Theories in Information Systems., and . ICIS, Association for Information Systems, (2011)The Effects of Perceptional Factors on Personal Information Disclosure., and . AMCIS, page 147. Association for Information Systems, (2004)A Meta-Analytic Review of Empirical Research on Online Information Privacy Concerns: Antecedents, Outcomes, and Moderators., , and . ICIS, Association for Information Systems, (2014)A Comparative Study of National Culture and Innovation: Effects of Cultural Dimensions on Traditional Innovation and Online Innovation., , and . HICSS, page 3615-3624. IEEE Computer Society, (2016)Cognitive Processes in Numerosity Comparison: Theory and Data., and . CogSci, cognitivesciencesociety.org, (2018)Active Learning for a Number-Line Task with Two Design Variables., , , , and . CogSci, page 638. cognitivesciencesociety.org, (2019)A Unified Framework for Bounded and Unbounded Numerical Estimation., and . CogSci, cognitivesciencesociety.org, (2016)Dynamics vs. Development in Numerosity Estimation: A Computational Model Accurately Predicts a Developmental Reversal., and . CogSci, cognitivesciencesociety.org, (2020)