From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Can financial incentives help with the struggle for security policy compliance?, , , и . Inf. Manag., 58 (4): 103447 (2021)The effects of knowledge mechanisms on employees' information security threat construal., , и . Inf. Syst. J., 33 (4): 790-841 (июля 2023)Apps within apps: predicting government WeChat mini-program adoption from trust-risk perspective and innovation diffusion theory., , , и . Inf. Technol. People, 35 (3): 1170-1190 (2022)Patient Health Information Search: An Exploratory Model of Web-based Search Behavior., , и . JOEUC, 15 (4): 49-61 (2003)User Interaction with Healthcare Information Systems: Do Healthcare Professionals Want to Comply with HIPAA?, , и . AMCIS, стр. 326. Association for Information Systems, (2006)Developing Measurement Scales for Passwords Uniqueness and Secrecy., и . AMCIS, Association for Information Systems, (2017)Analysis of systems development project risks: an integrative framework., , , и . DATA BASE, 40 (2): 8-27 (2009)Sustained Secure Behavior and the Role of Self-Efficacy., и . ICIS, Association for Information Systems, (2018)Leader's dilemma game: An experimental design for cyber insider threat research., и . Inf. Syst. Frontiers, 19 (2): 377-396 (2017)Do You Still Trust?: The Role of Age, Gender, and Privacy Concern on Trust after Insider Data Breaches., и . Data Base, 52 (4): 9-44 (2021)