Author of the publication

RIP: the use of inoculation theory and online social networking for enhancing attractiveness of IT occupations.

, , and . CPR, page 139-142. ACM, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis of end user security behaviors., , , and . Comput. Secur., 24 (2): 124-133 (2005)Spreading the word: the proliferation of research using social networks., , and . iConference, page 767-769. ACM, (2011)Charging Control and Transaction Accounting Mechanisms Using IRTL (Information Resource Transaction Layer) Middleware for P2P Services., , , , and . QofIS, volume 2511 of Lecture Notes in Computer Science, page 239-249. Springer, (2002)Discerning Emotions in Texts, , and . Proceedings of the AAAI Spring Symposium on Exploring Attitude and Affect in Text: Theories and Applications, Stanford, US, (2004)Company profile of the frequent Internet user. Communications of the ACM, (2002)What are we doing to improve recruitment and retention in information technology majors?, , , , , , and . CPR, page 40-42. ACM, (2008)Consumer Beliefs about Radio Frequency Identification (RFID) Systems.. AMCIS, page 403. Association for Information Systems, (2006)Bibliomining for Library Decision-Making., and . Encyclopedia of Information Science and Technology (I), Idea Group, (2005)Privacy in the YouTube Era: Evolving Concepts in the Protection of Personal Information., , , and . AMCIS, page 348. Association for Information Systems, (2007)RIP - beliefs about IT culture: exploring national and gender differences., , , and . CPR, page 217-220. ACM, (2007)