Author of the publication

Multiple Indicators and Multiple Causes (MIMIC) Models as a Mixed-Modeling Technique: A Tutorial and an Annotated Example.

, , , and . Commun. Assoc. Inf. Syst., (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Adaptive Roles of Positive and Negative Emotions in Organizational Insiders' Security-Based Precaution Taking., , , and . Inf. Syst. Res., 30 (4): 1228-1247 (2019)Proposing the online community self-disclosure model: the case of working professionals in France and the U.K. who use online communities., , , and . Eur. J. Inf. Syst., 19 (2): 181-195 (2010)Job Applicants' Information Privacy Protection Responses: Using Social Media for Candidate Screening., , , and . AIS Trans. Hum. Comput. Interact., 8 (4): 3 (2016)Insiders' Protection of Organizational Information Assets: Development of a Systematics-Based Taxonomy and Theory of Diversity for Protection-Motivated Behaviors., , , , and . MIS Q., 37 (4): 1189-1210 (2013)The Impact of Organizational Commitment on Insiders' Motivation to Protect Organizational Information Assets., , and . J. Manag. Inf. Syst., 32 (4): 179-214 (2015)The impact of anonymous, two-way, computer-mediated communication on perceived whistleblower credibility., , , , and . Inf. Technol. People, 34 (3): 1119-1151 (2021)Intentions to Comply Versus Intentions to Protect: A VIE Theory Approach to Understanding the Influence of Insiders' Awareness of Organizational SETA Efforts., , , , and . Decis. Sci., 49 (6): 1187-1228 (2018)Understanding the mindset of the abusive insider: An examination of insiders' causal reasoning following internal security changes., , and . Comput. Secur., 30 (6-7): 486-497 (2011)Assessing the Role of Security Education, Training, and Awareness on Insiders' Security-Related Behavior: An Expectancy Theory Approach., , , , and . HICSS, page 3930-3940. IEEE Computer Society, (2015)The analysis of formative measurement in IS research: choosing between component-and covariance-based techniques., , and . DATA BASE, 44 (4): 66-79 (2013)