Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

That's interesting: An examination of interest theory and self-determination in organisational cybersecurity training., , , and . Inf. Syst. J., 32 (4): 888-926 (2022)The impact of collectivism and psychological ownership on protection motivation: A cross-cultural examination., , and . Comput. Secur., (2018)Eating the Forbidden Fruit: Human Curiosity Entices Data Breaches., , and . AMCIS, Association for Information Systems, (2019)Investigating Privacy Concerns of Internet of Things (IoT) Users., and . AMCIS, Association for Information Systems, (2018)An Examination of Gain- and Loss-Framed Messaging on Smart Home Security Training Programs., and . Inf. Syst. Frontiers, 24 (5): 1395-1416 (2022)User Motivations in Protecting Information Security: Protection Motivation Theory Versus Self-Determination Theory., , and . J. Manag. Inf. Syst., 34 (4): 1203-1230 (2017)Using Accountability Theory to Determine How Curiosity Affects Policy Compliance., , , and . AMCIS, Association for Information Systems, (2020)I'm not fluent: How linguistic fluency, new media literacy, and personality traits influence fake news engagement behavior on social media., , and . Inf. Manag., 61 (2): 103912 (March 2024)Integrating truth bias and elaboration likelihood to understand how political polarisation impacts disinformation engagement on social media., , , and . Inf. Syst. J., 34 (3): 642-679 (May 2024)Who to Trust? Applying Trust to Social Commerce., , and . J. Comput. Inf. Syst., 59 (1): 32-42 (2019)