From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

The dark triad and insider threats in cyber security., , , и . Commun. ACM, 63 (12): 64-80 (2020)IT Capability: A Moderator Model of Competitive Advantage., и . AMCIS, стр. 701. Association for Information Systems, (2009)Beyond Compliance: Empowering Employees' Extra-Role Security Behaviors in Dynamic Environments., , , и . AMCIS, Association for Information Systems, (2017)Information Privacy-Protection Practices and User Continuance., и . AMCIS, Association for Information Systems, (2016)Understanding Resource Sharing In the Online Decentralized Peer-To-Peer Market Environment by Complex Adaptive System., и . AMCIS, Association for Information Systems, (2017)Understanding Self-Disclosure in Electronic Communities: An Exploratory Model of Privacy Risk Beliefs, Reciprocity, and Trust., и . AMCIS, стр. 9. Association for Information Systems, (2007)Human Resources Systems Outsourcing as a Source of Sustained Competitive Advantage: Proposal for an Empirical Investigation., и . AMCIS, стр. 798. Association for Information Systems, (2009)Information Securing in Organizations: A Dialectic Perspective., , , и . SIGMIS-CPR, стр. 125-130. ACM, (2019)Employer Preferences for Cybersecurity Skills among Information Systems Graduates., , , и . SIGMIS-CPR, стр. 131-134. ACM, (2019)Information Systems Managers' Perceptions of the Advantages and Disadvantages of Telecommuting: A Multivariate Analysis., и . HICSS (4), стр. 94-98. IEEE Computer Society, (1997)