Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Managing Security in Organizations: Adoption of Information Security Solutions., , and . SIGMIS-CPR, page 87-88. ACM, (2017)Applying an extended model of deterrence across cultures: An investigation of information systems misuse in the U.S. and South Korea., and . Inf. Manag., 49 (2): 99-110 (2012)Deterring internal information systems misuse., and . Commun. ACM, 50 (10): 113-117 (2007)Managing E-Mail Overload: Solutions and Future Challenges., , , and . Computer, 40 (2): 31-36 (2007)The Impact of Virus Attack Announcements on the Market Value of Firms., and . Information Systems Security, 13 (3): 32-40 (2004)"Cargo Cult" science in traditional organization and information systems survey research: A case for using nontraditional methods of data collection, including Mechanical Turk and online panels., , , and . J. Strateg. Inf. Syst., 25 (3): 232-240 (2016)Security culture and the employment relationship as drivers of employees' security compliance., and . Inf. Manag. Comput. Secur., 22 (5): 474-489 (2014)Dual Role of IT-Assisted Communication in Patient Care: A Validated Structure-Process-Outcome Framework., , and . J. Manag. Inf. Syst., 29 (2): 257-292 (2012)A DevOps Perspective: the Impact of Role Transitions on Software Security Continuity., and . ECIS, (2023)Seeing the forest and the trees: A meta-analysis of information security policy compliance literature., , and . HICSS, page 1-10. ScholarSpace / AIS Electronic Library (AISeL), (2017)