Author of the publication

Integrating Cognition with an Affective Lens to Better Understand Information Security Policy Compliance.

, , and . J. AIS, 20 (12): 4 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

InfoSec Process Action Model (IPAM): Targeting Insiders' Weak Password Behavior., , , and . J. Inf. Syst., 33 (3): 201-225 (2019)Cultivating cybersecurity learning: An integration of self-determination and flow., , , and . Comput. Secur., (2020)Information Security Compliance: A Complete Values View., and . AMCIS, Association for Information Systems, (2019)The Quest for Complete Security Protection: An Empirical Analysis of an Individual's 360 Degree Protection from File and Data Loss., and . AMCIS, Association for Information Systems, (2012)Disclosing too much? Situational factors affecting information disclosure in social commerce environment., and . Electron. Commer. Res. Appl., 13 (5): 305-319 (2014)Teaching Case: Bank Solutions Disaster Recovery and Business Continuity: A Case Study for Business Students., , , and . J. Inf. Syst. Educ., 22 (2): 117-122 (2011)Establishing Election Integrity Online: The Role of Auditor Source Credibility in Voter Believability of Election Results., , and . AMCIS, Association for Information Systems, (2021)Voluntary Disclosures via Social Media and the Role of Comments., , and . J. Information Systems, 29 (3): 101-121 (2015)Why social media users share private images: Ignorance or Social Reward., and . AMCIS, Association for Information Systems, (2019)Implications of Monitoring Mechanisms on Bring Your Own Device (BYOD) Adoption., , and . ICIS, Association for Information Systems, (2013)