Autor der Publikation

Seeing the forest and the trees: A meta-analysis of information security policy compliance literature.

, , und . HICSS, Seite 1-10. ScholarSpace / AIS Electronic Library (AISeL), (2017)

Bitte wählen Sie eine Person um die Publikation zuzuordnen

Um zwischen Personen mit demselben Namen zu unterscheiden, wird der akademische Grad und der Titel einer wichtigen Publikation angezeigt. Zudem lassen sich über den Button neben dem Namen einige der Person bereits zugeordnete Publikationen anzeigen.

 

Weitere Publikationen von Autoren mit dem selben Namen

Organizational information security policies: a review and research framework., , und . Eur. J. Inf. Syst., 26 (6): 605-641 (2017)Seeing the Forest and the Trees: A Meta-Analysis of the Antecedents to Information Security Policy Compliance., , und . MIS Q., (2019)Sleight of Hand: Identifying Concealed Information by Monitoring Mouse-Cursor Movements., , , , und . J. Assoc. Inf. Syst., 20 (1): 3 (2019)Regulatory Facilitators and Impediments Impacting Cybersecurity Maturity., und . AMCIS, Association for Information Systems, (2022)Seeing the forest and the trees: A meta-analysis of information security policy compliance literature., , und . HICSS, Seite 1-10. ScholarSpace / AIS Electronic Library (AISeL), (2017)A Systems Approach to Countermeasures in Credibility Assessment Interviews., , , und . ICIS, Association for Information Systems, (2013)Maximizing Employee Compliance with Cybersecurity Policies., , und . MIS Q. Executive, 19 (3): 5 (2020)Too Busy to Be Manipulated: How Multitasking with Technology Improves Deception Detection in Collaborative Teamwork., , , , , und . J. Manag. Inf. Syst., 37 (2): 377-395 (2020)Man vs. machine: Investigating the effects of adversarial system use on end-user behavior in automated deception detection interviews., , und . Decis. Support Syst., (2016)Improving Password Cybersecurity Through Inexpensive and Minimally Invasive Means: Detecting and Deterring Password Reuse Through Keystroke-Dynamics Monitoring and Just-in-Time Fear Appeals., , , und . Inf. Technol. Dev., 20 (2): 196-213 (2014)