Author of the publication

Social network analysis in accounting information systems research.

, , and . Int. J. Account. Inf. Syst., 14 (2): 127-137 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Impact of National Culture on Workplace Privacy Expectations in the Context of Information Security Assurance., , and . AMCIS, page 521. Association for Information Systems, (2009)Engaging Remote Employees: The Moderating Role of "Remote" Status in Determining Employee Information Security Policy Awareness., , and . JOEUC, 25 (1): 1-23 (2013)Personality and IT security: An application of the five-factor model., , , and . AMCIS, page 415. Association for Information Systems, (2006)The Role of Perceptions of Organizational Injustice and Techniques of Neutralization in Forming Computer Abuse Intentions., , and . AMCIS, Association for Information Systems, (2011)Impact of Negative Message Framing on Security Adoption., , and . J. Comput. Inf. Syst., 51 (1): 41-51 (2010)Risk Perspectives in Systems Development., , , and . AMCIS, page 273. Association for Information Systems, (2007)Continuance of protective security behavior: A longitudinal study., , , and . Decis. Support Syst., (2016)The influence of the informal social learning environment on information privacy policy compliance efficacy and intention., , and . Eur. J. Inf. Syst., 20 (3): 267-284 (2011)Peering through the lens of high-reliability theory: A competencies driven security culture model of high-reliability organisations., and . Inf. Syst. J., 33 (5): 1212-1238 (September 2023)A neo-institutional perspective on the establishment of information security knowledge sharing practices., , and . Inf. Manag., 59 (1): 103574 (2022)