Author of the publication

Mobile contactless payments adoption challenge in the complex network actor ecosystem.

, , and . Bled eConference, page 33. (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Organizational Culture Impact on Acceptance and Use of Unified Communications & Collaboration Technology in Organizations., and . Bled eConference, page 28. (2013)Ambidextrous organization and agility in big data era: The role of business process management systems., , , and . Business Proc. Manag. Journal, 24 (5): 1091-1109 (2018)Influence of Shadow IT on Innovation in Organizations., , and . Complex Syst. Informatics Model. Q., (2016)Critical impact of organizational and individual inertia in explaining non-compliant security behavior in the Shadow IT context.. Comput. Secur., (2019)Evaluating the Role of Trust in Adoption: A Conceptual Replication in the Context of Open Source Systems., , and . AIS Trans. Replication Res., (2018)Health Belief Model and Organizational Employee Computer Abuse., , , and . HCI (23), volume 10923 of Lecture Notes in Computer Science, page 187-205. Springer, (2018)Understanding Color Risk Appropriateness: Influence of Color on a User's Decision to Comply with the IT Security Policy - Evidence from the U.S. and India., , and . HCI (24), volume 10294 of Lecture Notes in Computer Science, page 412-423. Springer, (2017)Dual-use open source security software in organizations - Dilemma: Help or hinder?. Comput. Secur., (2013)Breaking Bad in Cyberspace: Understanding why and how Black Hat Hackers Manage their Nerves to Commit their Virtual Crimes., and . Inf. Syst. Frontiers, 23 (2): 329-341 (2021)Using Design-Science Based Gamification to Improve Organizational Security Training and Compliance., and . J. Manag. Inf. Syst., 37 (1): 129-161 (2020)