Author of the publication

A new perspective on neutralization and deterrence: Predicting shadow IT usage.

, , and . Inf. Manag., 54 (8): 1023-1037 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Organizational Culture Impact on Acceptance and Use of Unified Communications & Collaboration Technology in Organizations., and . Bled eConference, page 28. (2013)Influence of Shadow IT on Innovation in Organizations., , and . Complex Syst. Informatics Model. Q., (2016)Ambidextrous organization and agility in big data era: The role of business process management systems., , , and . Business Proc. Manag. Journal, 24 (5): 1091-1109 (2018)Critical impact of organizational and individual inertia in explaining non-compliant security behavior in the Shadow IT context.. Comput. Secur., (2019)Evaluating the Role of Trust in Adoption: A Conceptual Replication in the Context of Open Source Systems., , and . AIS Trans. Replication Res., (2018)Understanding Color Risk Appropriateness: Influence of Color on a User's Decision to Comply with the IT Security Policy - Evidence from the U.S. and India., , and . HCI (24), volume 10294 of Lecture Notes in Computer Science, page 412-423. Springer, (2017)Health Belief Model and Organizational Employee Computer Abuse., , , and . HCI (23), volume 10923 of Lecture Notes in Computer Science, page 187-205. Springer, (2018)Using Design-Science Based Gamification to Improve Organizational Security Training and Compliance., and . J. Manag. Inf. Syst., 37 (1): 129-161 (2020)Breaking Bad in Cyberspace: Understanding why and how Black Hat Hackers Manage their Nerves to Commit their Virtual Crimes., and . Inf. Syst. Frontiers, 23 (2): 329-341 (2021)Dual-use open source security software in organizations - Dilemma: Help or hinder?. Comput. Secur., (2013)