Author of the publication

Engaging Remote Employees: The Moderating Role of "Remote" Status in Determining Employee Information Security Policy Awareness.

, , and . JOEUC, 25 (1): 1-23 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Personality and IT security: An application of the five-factor model., , , and . AMCIS, page 415. Association for Information Systems, (2006)Impact of Negative Message Framing on Security Adoption., , and . J. Comput. Inf. Syst., 51 (1): 41-51 (2010)Peering through the lens of high-reliability theory: A competencies driven security culture model of high-reliability organisations., and . Inf. Syst. J., 33 (5): 1212-1238 (September 2023)A neo-institutional perspective on the establishment of information security knowledge sharing practices., , and . Inf. Manag., 59 (1): 103574 (2022)The Impact of National Culture on Workplace Privacy Expectations in the Context of Information Security Assurance., , and . AMCIS, page 521. Association for Information Systems, (2009)Engaging Remote Employees: The Moderating Role of "Remote" Status in Determining Employee Information Security Policy Awareness., , and . JOEUC, 25 (1): 1-23 (2013)Continuance of protective security behavior: A longitudinal study., , , and . Decis. Support Syst., (2016)Risk Perspectives in Systems Development., , , and . AMCIS, page 273. Association for Information Systems, (2007)The Role of Perceptions of Organizational Injustice and Techniques of Neutralization in Forming Computer Abuse Intentions., , and . AMCIS, Association for Information Systems, (2011)The influence of the informal social learning environment on information privacy policy compliance efficacy and intention., , and . Eur. J. Inf. Syst., 20 (3): 267-284 (2011)