Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The molecular basis of dominance, and . Genetics, 97 (3-4): 639-666 (March 1981)Control analysis of metabolic systems, , , , , , , , , and . Trends Biochem. Sci., (1985)Imaging of Titan from the Cassini spacecraft, , , , , , , , , and 26 other author(s). Nature, 434 (7030): 159--168 (2005)Securing Health Information., and . IT Prof., 17 (1): 23-29 (2015)Intentions to Comply Versus Intentions to Protect: A VIE Theory Approach to Understanding the Influence of Insiders' Awareness of Organizational SETA Efforts., , , , and . Decis. Sci., 49 (6): 1187-1228 (2018)Security Organizing: A Framework for Organizational Information Security Mindfulness.. Data Base, 50 (4): 14-27 (2019)Spear phishing in a barrel: Insights from a targeted phishing campaign., , and . J. Organ. Comput. Electron. Commer., 29 (1): 24-39 (2019)Complex Adaptive Systems, Agent-Based Modeling and Information Assurance., , , and . AMCIS, Association for Information Systems, (2012)Assessing the Role of Security Education, Training, and Awareness on Insiders' Security-Related Behavior: An Expectancy Theory Approach., , , , and . HICSS, page 3930-3940. IEEE Computer Society, (2015)The Evolving Cyberthreat to Privacy., and . IT Prof., 20 (3): 64-72 (2018)