Author of the publication

Repeated Use of E-Gov Web Sites: A Satisfaction and Confidentiality Perspective.

, , , and . Int. J. Electron. Gov. Res., 2 (3): 1-22 (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A socio-technical approach to knowledge contribution behavior: An empirical investigation of social networking sites users., and . Int. J. Inf. Manag., 32 (2): 118-126 (2012)An impact of information security investment on information security incidents: a case of Korean organizations., , , and . ICEC, page 41:1-41:4. ACM, (2016)Cross-cultural and gender associations with anxiety about electronic data hacking., , , and . Comput. Hum. Behav., (2017)Repeated Use of E-Gov Web Sites: A Satisfaction and Confidentiality Perspective., , , and . Int. J. Electron. Gov. Res., 2 (3): 1-22 (2006)Internalization of Information Security Policy and Information Security Practice: A Comparison with Compliance., and . HICSS, page 1-9. ScholarSpace / AIS Electronic Library (AISeL), (2018)The Empirical Investigation of a Wiki based group system in organizations., , and . AMCIS, page 317. Association for Information Systems, (2010)A Framework for Understanding Minority Students' Cyber Security Career Interests., , , , and . AMCIS, page 413. Association for Information Systems, (2006)What makes bloggers share knowledge? An investigation on the role of trust., and . Int. J. Inf. Manag., 30 (5): 408-415 (2010)Firms' information security investment decisions: Stock market evidence of investors' behavior., , and . Decis. Support Syst., 50 (4): 651-661 (2011)Women in Cybersecurity: A Study of Career Advancement., , , and . IT Prof., 12 (1): 24-31 (2010)