Author of the publication

Linking Threat Avoidance and Security Adoption: A Theoretical Model For SMEs.

, , and . Bled eConference, page 35. (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

It Is About Time: Investigating the Temporal Parameters of Decision-Making in Agile Teams., , , and . ISD, page 455-465. Springer, (2012)Web-enabled boundary spanners and their role in the knowledge flow network., , , and . ECIS, page 689-700. (2009)Digitising the R&D social network: revisiting the technological gatekeeper., , and . Inf. Syst. J., 23 (3): 197-218 (2013)Knowledge Diffusion in Contemporary R&D Groups; Re-Examining The Role Of The Technological Gatekeeper., , and . Knowledge Management and Organizational Learning, volume 4 of Annals of Information Systems, Springer, (2009)How technostress and self-control of social networking sites affect academic achievement and wellbeing., , and . Internet Res., 32 (7): 280-306 (2022)Information Systems - Unavoidable Nuisances in Combining Local Administratives?, , , , and . Bled eConference, page 8. (2009)Exploring the development of social alignment within an innovation context., and . ECIS, page 1951-1962. (2009)Linking Threat Avoidance and Security Adoption: A Theoretical Model For SMEs., , and . Bled eConference, page 35. (2015)Enterprise Personal Analytics: The Next Frontier in Individual Information Systems Research., , , and . Found. Trends Inf. Syst., 2 (4): 296-387 (2018)An Exploratory Study of the Implementation of an Energy Management Information System using an Adapted Adaptive Structuration Theory Model., , and . ICIS, page 84. Association for Information Systems, (2008)