Author of the publication

RIP: the use of inoculation theory and online social networking for enhancing attractiveness of IT occupations.

, , and . CPR, page 139-142. ACM, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Information Security Practices in Latin America: The case of Bolivia., , , and . AMCIS, page 492. Association for Information Systems, (2010)Behavioral Information Security: Two End User Survey Studies of Motivation and Security Practices., , , and . AMCIS, page 175. Association for Information Systems, (2004)The Visible Employee: Electronic Monitoring and Information Security., and . AMCIS, page 407. Association for Information Systems, (2006)Examining the linkage between organizational commitment and information security., , , and . SMC, page 2501-2506. IEEE, (2003)Information Technology, Privacy, and Power within Organizations: a view from Boundary Theory and Social Exchange Perspectives, and . Surveillance & Society, 1 (2): 152--190 (2003)RIP: the use of inoculation theory and online social networking for enhancing attractiveness of IT occupations., , and . CPR, page 139-142. ACM, (2009)Exploring Security and Privacy Issues in Hospital Information System: An Information Boundary Theory Perspective., , and . AMIA, AMIA, (2003)A qualitative study of the occupational subculture of information systems employees in organizations., , , , , , and . CPR, page 74-80. ACM, (2004)Analysis of end user security behaviors., , , and . Comput. Secur., 24 (2): 124-133 (2005)