Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Going Spear Phishing: Exploring Embedded Training and Awareness., , , and . IEEE Secur. Priv., 12 (1): 28-38 (2014)Meaningful Healthcare Security: Does Meaningful-Use Attestation Improve Information Security Performance?, and . MIS Q., (2018)Performance Analysis of Split-Case Sorting Systems., and . Manuf. Serv. Oper. Manag., 4 (4): 258-274 (2002)Focus on health information technology, electronic health records and their financial impact: Medication administration quality and health information technology: a national study of US hospitals., , , and . J. Am. Medical Informatics Assoc., 19 (3): 360-367 (2012)Security practices and regulatory compliance in the healthcare industry., and . JAMIA, 20 (1): 44-51 (2013)Why file sharing networks are dangerous?, , and . Commun. ACM, 52 (2): 134-138 (2009)Data Hemorrhages in the Health-Care Sector.. Financial Cryptography, volume 5628 of Lecture Notes in Computer Science, page 71-89. Springer, (2009)EMBEDR: Distinguishing signal from noise in single-cell omics data., , and . Patterns, 3 (3): 100443 (2022)Security Resources, Capabilities and Cultural Values: Links to Security Performance and Compliance., and . WEIS, (2012)The Impact of Information Security Rating on Vendor Competition., and . AMCIS, page 280. Association for Information Systems, (2009)