Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Strategies for Ensuring High Availability Cloud Services.. AMCIS, Association for Information Systems, (2015)Perceived Value of Podcasting: Student Communication-Medium Preferences., , , , and . AMCIS, page 271. Association for Information Systems, (2006)A stitch in time saves nine: the role of moral judgement in reducing internet policy violations., , and . Int. J. Bus. Inf. Syst., 24 (3): 369-386 (2017)Defining Audience Awareness for Information Systems Research., , and . CPR, page 77-82. ACM, (2016)Near-Real-Time IDS for the U.S. FAA's NextGen ADS-B., , , , , , and . Big Data Cogn. Comput., 5 (2): 27 (2021)Personality, attitudes, and intentions: Predicting initial adoption of information security behavior., , and . Comput. Secur., (2015)Characterizing the Traits of Top-Performing Security Personnel., and . CPR, page 55-59. ACM, (2015)Insight from a Docker Container Introspection., , , and . HICSS, page 1-10. ScholarSpace, (2019)Insight from a Containerized Kubernetes Workload Introspection., , , and . HICSS, page 1-10. ScholarSpace, (2021)A Measure for Assessing the Adequacy of DDOS Defenses., and . AMCIS, Association for Information Systems, (2013)