Author of the publication

Contextualized Meaning Extraction: A Meta-Algorithm for Big Data Text Mining with Pragmatics.

, and . IJOCI, 7 (3): 15-29 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Organization Man and the Innovator: Theoretical Archetypes to Inform Behavioral Information Security Research., and . DATA BASE, 49 (SI): 67-80 (2018)Learning Computing Topics in Undergraduate Information Systems Courses: Managing Perceived Difficulty., and . J. Inf. Syst. Educ., 25 (3): 245-259 (2014)Theorizing the Behavioral Effects of Control Complementarity in Security Control Portfolios., , and . Inf. Syst. Frontiers, 24 (2): 637-658 (2022)Contextualized Meaning Extraction: A Meta-Algorithm for Big Data Text Mining with Pragmatics., and . IJOCI, 7 (3): 15-29 (2017)Organizational Violations of Externally Governed Privacy and Security Rules: Explaining and Predicting Selective Violations under Conditions of Strain and Excess., , and . J. Assoc. Inf. Syst., 17 (1): 4 (2016)A genomic history of Aboriginal Australia., , , , , , , , , and 65 other author(s). Nat., 538 (7624): 207-214 (2016)Perceived argument quality's effect on threat and coping appraisals in fear appeals: An experiment and exploration of realism check heuristics., and . Inf. Manag., (2019)Critical Discourse Analysis as a Review Methodology: An Empirical Example., , and . Commun. Assoc. Inf. Syst., (2015)Proposing the core contributor withdrawal theory (CCWT) to understand core contributor withdrawal from online peer-production communities., , , , and . Internet Res., 28 (4): 988-1028 (2018)Understanding employees' information security identities: an interpretive narrative approach., and . Inf. Technol. People, 35 (1): 435-458 (2022)