Author of the publication

Believe It or Not: Employees Intend to Comply With Information Security Policy Because of the Desire for Trade-Offs.

, , , and . J. Glob. Inf. Manag., 29 (6): 1-20 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Not All Are the Same: Facets of Conscientiousness, Competitive Virtual Team Functions, and Continuance Intention., , and . PACIS, page 17. (2018)A Dual-Process Model to Assess User Attitudes and the Likelihood of Electronic Word-Of-Mouth Adoption., , and . PACIS, page 226. (2015)From customer orientation to customer satisfaction: the gap between theory and practice., , and . IEEE Trans. Engineering Management, 51 (1): 85-97 (2004)The impact of information sharing in a two-level supply chain with multiple retailers., and . JORS, 56 (10): 1159-1165 (2005)Two-agent single-machine scheduling to minimize the batch delivery cost., , , , and . Comput. Ind. Eng., (2016)Two-agent flowshop scheduling to maximize the weighted number of just-in-time jobs., , , and . J. Sched., 20 (4): 313-335 (2017)How do avatar attractiveness and customization impact online gamers' flow and loyalty?, , and . Internet Res., 29 (2): 349-366 (2019)Inefficiency of the Nash equilibrium for selfish machine covering on two hierarchical uniform machines., , and . Inf. Process. Lett., 115 (11): 838-844 (2015)Single-machine scheduling with accelerating deterioration effects., , , and . Optim. Lett., 8 (2): 543-554 (2014)Scheduling with a position-weighted learning effect., , and . Optim. Lett., 8 (1): 293-306 (2014)