Author of the publication

Using network-based text analysis to analyze trends in Microsoft's security innovations.

, , , , and . Comput. Secur., (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Creating a Taxonomy for Mobile Commerce Innovations Using Social Network and Cluster Analyses., , and . Int. J. Electron. Commer., 16 (4): 19-52 (2012)Cyberloafing in the workplace: mitigation tactics and their impact on individuals' behavior., , , and . Inf. Technol. Manag., 19 (4): 197-215 (2018)Acceptance, Use, and Influence of Political Technologies among Youth Voters in the 2008 US Presidential Election., , and . IJEP, 1 (4): 1-21 (2010)Human Error and Privacy Breaches in Healthcare Organizations: Causes and Management Strategies., , , and . AMCIS, page 406. Association for Information Systems, (2009)Privacy and E-Authentication: The Dangers of Self-disclosure in Social Networks., and . WEB, volume 52 of Lecture Notes in Business Information Processing, page 166-176. Springer, (2009)Information Security Economics: An Investigation of Demand-Driven Innovation and Market Value.. AMCIS, page 395. Association for Information Systems, (2007)Assessing Innovations in Cloud Security., and . J. Comput. Inf. Syst., 54 (3): 45-56 (2014)Using network-based text analysis to analyze trends in Microsoft's security innovations., , , , and . Comput. Secur., (2013)Active Community Participation and Crowdworking Turnover: A Longitudinal Model and Empirical Test of Three Mechanisms., , and . J. Manag. Inf. Syst., 35 (4): 1154-1187 (2018)Prominence and Engagement: Different Mechanisms Regulating Continuance and Contribution in Online Communities., , and . J. Manag. Inf. Syst., 37 (1): 162-190 (2020)