Author of the publication

The value of the CIO in the top management team on performance in the case of information security breaches.

, , and . Inf. Syst. Frontiers, 18 (6): 1205-1215 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Contextual reflections on innovations in an interconnected world: theoretical lenses and practical considerations in ICT4D., and . Inf. Technol. Dev., 24 (3): 423-428 (2018)Towards Applying Deep Learning to the Internet of Things: A Model and a Framework., and . EMCIS, volume 402 of Lecture Notes in Business Information Processing, page 383-398. Springer, (2020)Development of a consumer financial goals ontology for use with FinTech applications for improving financial capability., , and . Expert Syst. Appl., (2021)Exploring the Impacts of Intrinsic Variables on Security Compliance Efficiency Using DEA and MARS., , and . ICT4D (1), volume 551 of IFIP Advances in Information and Communication Technology, page 751-762. Springer, (2019)Cybersecurity compliance behavior: Exploring the influences of individual decision style and other antecedents., and . Int. J. Inf. Manag., (2020)Profiling internet banking users: A knowledge discovery in data mining process model based approach., , , and . Inf. Syst. Frontiers, 17 (1): 193-215 (2015)A data analytic benchmarking methodology for discovering common causal structures that describe context-diverse heterogeneous groups., and . Expert Syst. Appl., (2019)The communicative power of knowledge visualizations in mobilizing information and communication technology research., and . Inf. Technol. Dev., 26 (4): 637-652 (2020)Analyzing the impact of information technology investments using regression and data mining techniques., and . J. Enterp. Inf. Manag., 19 (4): 403-417 (2006)Toward a cybercrime classification ontology: A knowledge-based approach., and . Comput. Hum. Behav., (2019)