From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Implications of Monitoring Mechanisms on Bring Your Own Device (BYOD) Adoption., , и . ICIS, Association for Information Systems, (2013)Gender deception in asynchronous online communication: A path analysis., , , , и . Inf. Process. Manag., 53 (1): 21-41 (2017)The effects of social media use on control of corruption and moderating role of cultural tightness-looseness., , , , и . Gov. Inf. Q., (2019)Is the responsibilization of the cyber security risk reasonable and judicious?, , , , и . Comput. Secur., (2018)Issues in wireless E-commerce., и . SIGecom Exch., 1 (1): 21-25 (2000)Managers' and Employees' Differing Responses to Security Approaches., , и . J. Comput. Inf. Syst., 59 (3): 197-210 (2019)Threat Protection and Convenience: Antecedents of Cloud-Based Data Backup., , и . J. Comput. Inf. Syst., 55 (1): 83-91 (2014)Reactions to Abusive Supervision: Neutralization and IS Misuse., , , и . J. Comput. Inf. Syst., 62 (3): 632-641 (2022)Understanding Rumor Combating Behavior on Social Media., , , и . J. Comput. Inf. Syst., 62 (6): 1112-1124 (ноября 2022)The Role of Technological and Social Factors on the Adoption of Mobile Payment Technologies., , и . AMCIS, стр. 333. Association for Information Systems, (2004)