Author of the publication

What Interrupts Intention to Comply with IS-Security Policy?

, and . AMCIS, Association for Information Systems, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Semiotic Analysis of Knowledge Intensive Business Processes: Developing Interpretations for Sustainable Competitive Advantage., and . AMCIS, page 389. Association for Information Systems, (2005)Factors Affecting the Use and Adoption of EDI in Manufacturing SMEs: Experiences From Portugal., and . ECIS, page 1184-1190. Cork Publishing Ltd, (1997)Panel: Developing An Ethical Agenda for A Networked Workplace., , , , and . ECIS, page 1535-1536. Cork Publishing Ltd, (1997)Developing A Networked Authority: Nature and Significance of Power Relationships., , and . ECIS, page 511-525. Cork Publishing Ltd, (1997)Electronic thesaurus for clinical terms: A methodological approach., and . ECIS, page 591-600. (1995)Developing Integrated Solutions in the Health Care Environment: A Case Study., and . ECIS, page 1163-1172. (1996)What Interrupts Intention to Comply with IS-Security Policy?, and . AMCIS, Association for Information Systems, (2016)Investigating Continuous Security Compliance Behavior: Insights from Information Systems Continuance Model., , and . AMCIS, Association for Information Systems, (2016)Value-Focused Assessment of Information System Security in Organizations., and . ICIS, page 561-566. Association for Information Systems, (2001)When Convenience Trumps Security: Defining Objectives for Security and Usability of Systems., , , and . SEC, volume 376 of IFIP Advances in Information and Communication Technology, page 352-363. Springer, (2012)