Author of the publication

Equipment-as-Experience: A Heidegger-Based Position of Information Security.

, and . ICIS, Association for Information Systems, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Materializing Organizational Information Security., and . SCIS, volume 124 of Lecture Notes in Business Information Processing, page 76-94. Springer, (2012)Genre-Based Approach to Assessing Information and Knowledge Security Risks., , and . IJKM, 10 (2): 13-27 (2014)Multi-Layers of Information Security in Emergency Response., and . IJISCRAM, 3 (2): 1-17 (2011)A Framework for Classifying Design Research Methods., and . DESRIST, volume 7939 of Lecture Notes in Computer Science, page 479-485. Springer, (2013)Interpreting Information Security Policy Outcomes: A Frames of Reference Perspective., , and . HICSS, page 4541-4550. IEEE Computer Society, (2013)Rethinking the Information Security Risk Practices: A Critical Social Theory Perspective., and . HICSS, page 3207-3214. IEEE Computer Society, (2014)A Methodology for Inter-Organizational Emergency Management Continuity Planning., , , and . IJISCRAM, 2 (4): 1-19 (2010)Equipment-as-Experience: A Heidegger-Based Position of Information Security., and . ICIS, Association for Information Systems, (2016)Shaping Security Behavior through Discipline and Agility: Implications for Information Security Management., and . Inf. Manag. Comput. Secur., 19 (4): 262-276 (2011)Socio-Technical Design Approach for Crisis Management Information Systems., , and . IJISCRAM, 1 (3): 1-18 (2009)