Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Securing Health Information., and . IT Prof., 17 (1): 23-29 (2015)The molecular basis of dominance, and . Genetics, 97 (3-4): 639-666 (March 1981)Control analysis of metabolic systems, , , , , , , , , and . Trends Biochem. Sci., (1985)Imaging of Titan from the Cassini spacecraft, , , , , , , , , and 26 other author(s). Nature, 434 (7030): 159--168 (2005)Intentions to Comply Versus Intentions to Protect: A VIE Theory Approach to Understanding the Influence of Insiders' Awareness of Organizational SETA Efforts., , , , and . Decis. Sci., 49 (6): 1187-1228 (2018)Complex Adaptive Systems, Agent-Based Modeling and Information Assurance., , , and . AMCIS, Association for Information Systems, (2012)Assessing the Role of Security Education, Training, and Awareness on Insiders' Security-Related Behavior: An Expectancy Theory Approach., , , , and . HICSS, page 3930-3940. IEEE Computer Society, (2015)The Evolving Cyberthreat to Privacy., and . IT Prof., 20 (3): 64-72 (2018)Cassini Imaging Science: Initial results on Phoebe and Iapetus, , , , , , , , , and 25 other author(s). Science, 307 (5713): 1237--1242 (February 2005)Evidence for a subsurface ocean on Europa, , , , , , , , , and 12 other author(s). Nature, 391 (6665): 363--365 (1998)