Author of the publication

Personality and IT security: An application of the five-factor model.

, , , and . AMCIS, page 415. Association for Information Systems, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Tablet PCs for Teaching Information Systems Courses., , and . AMCIS, page 242. Association for Information Systems, (2005)Videostreaming, HorizonLive, and Tablet PCs for Teaching Information Systems Courses: Revisited., , and . AMCIS, page 11. Association for Information Systems, (2004)Rootkits and What we Know: Assessing US and Korean Knowledge and Perceptions., , , , and . Int. J. Inf. Secur. Priv., 1 (4): 75-86 (2007)Synthesis and Analysis of Moore and Benbasat's PCI and Witte's Susceptibility and Severity of Threat Scales., and . AMCIS, page 196. Association for Information Systems, (2007)Comparing Security Perceptions of E-Commerce Users., , , and . AMCIS, page 288. Association for Information Systems, (2007)Assessing Student Interest in Hybrid Course Delivery at the MBA Level., , , and . AMCIS, page 617. Association for Information Systems, (2009)Digital Steganography - An Introduction to Techniques and Tools., , , and . Commun. Assoc. Inf. Syst., (2012)Wireless Network Security in Hospitality SMEs., , and . AMCIS, page 51. Association for Information Systems, (2004)Mitigation of Identity Theft in the Information Age., , and . Encyclopedia of Information Ethics and Security, IGI Global, (2007)Explaining is Student and is Industry Differences in Perceptions of Skill Importance., , and . J. Comput. Inf. Syst., 41 (4): 79-83 (2001)