Author of the publication

Applying network analysis to investigate interpersonal influence of information security behaviours in the workplace.

, , and . Inf. Manag., 54 (5): 625-637 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Characteristics of web applications that affect usability: a review., , and . OZCHI, volume 122 of ACM International Conference Proceeding Series, ACM, (2005)Exploring behavioral information security networks in an organizational context: An empirical case study., , and . J. Inf. Secur. Appl., (2017)Who influences information security behaviours of young home computer users in Vietnam? An ego-centric network analysis approach., , and . ACIS, page 30. (2016)Understanding the Formation of Information Security Climate Perceptions: A Longitudinal Social Network Analysis., , , and . ACIS, page 27. (2017)Names and Faces: a staff dashboard to support student learning engagement., , and . ACIS, page 30. (2018)Applying network analysis to investigate interpersonal influence of information security behaviours in the workplace., , and . Inf. Manag., 54 (5): 625-637 (2017)Making usability work in industry: an Australian practitioner perspective., and . OZCHI, volume 251 of ACM International Conference Proceeding Series, page 261-264. ACM, (2007)Do you need general principles or concrete heuristics?: a model for categorizing usability criteria., and . OZCHI, volume 287 of ACM International Conference Proceeding Series, page 105-111. ACM, (2008)Exploring the Social Networks of Online Investors., , and . ACIS, page 112. (2013)Decision Support Research in Warehousing and Distribution: A Systematic Literature Review., , and . Int. J. Inf. Technol. Decis. Mak., 19 (3): 653-693 (2020)