Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Imaging of Titan from the Cassini spacecraft, , , , , , , , , and 26 other author(s). Nature, 434 (7030): 159--168 (2005)The molecular basis of dominance, and . Genetics, 97 (3-4): 639-666 (March 1981)Securing Health Information., and . IT Prof., 17 (1): 23-29 (2015)Control analysis of metabolic systems, , , , , , , , , and . Trends Biochem. Sci., (1985)Spear phishing in a barrel: Insights from a targeted phishing campaign., , and . J. Organ. Comput. Electron. Commer., 29 (1): 24-39 (2019)Security Organizing: A Framework for Organizational Information Security Mindfulness.. Data Base, 50 (4): 14-27 (2019)Intentions to Comply Versus Intentions to Protect: A VIE Theory Approach to Understanding the Influence of Insiders' Awareness of Organizational SETA Efforts., , , , and . Decis. Sci., 49 (6): 1187-1228 (2018)Complex Adaptive Systems, Agent-Based Modeling and Information Assurance., , , and . AMCIS, Association for Information Systems, (2012)Assessing the Role of Security Education, Training, and Awareness on Insiders' Security-Related Behavior: An Expectancy Theory Approach., , , , and . HICSS, page 3930-3940. IEEE Computer Society, (2015)Evidence for a subsurface ocean on Europa, , , , , , , , , and 12 other author(s). Nature, 391 (6665): 363--365 (1998)