Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Issues in wireless E-commerce., and . SIGecom Exch., 1 (1): 21-25 (2000)Social identity and trust in internet-based voting adoption., , , , and . Gov. Inf. Q., 35 (2): 195-209 (2018)Overcoming Mixed-Gender Requirements Misspecification with the Modified Coherence Method., and . AMCIS, Association for Information Systems, (2012)Government of the People, By the People: A Look at Trust in eGovernment., , , , and . AMCIS, Association for Information Systems, (2012)Understanding Nuances of Privacy and Security in the Context of Information Systems., , and . AMCIS, Association for Information Systems, (2017)Reactions to Abusive Supervision: Neutralization and IS Misuse., , , and . J. Comput. Inf. Syst., 62 (3): 632-641 (2022)Understanding Rumor Combating Behavior on Social Media., , , and . J. Comput. Inf. Syst., 62 (6): 1112-1124 (November 2022)Managers' and Employees' Differing Responses to Security Approaches., , and . J. Comput. Inf. Syst., 59 (3): 197-210 (2019)Threat Protection and Convenience: Antecedents of Cloud-Based Data Backup., , and . J. Comput. Inf. Syst., 55 (1): 83-91 (2014)Understanding Unstable Information Systems Phenomena: A Punctuated Equilibrium Perspective., , , , and . HICSS, page 1-10. ScholarSpace, (2021)