Author of the publication

A new perspective on neutralization and deterrence: Predicting shadow IT usage.

, , and . Inf. Manag., 54 (8): 1023-1037 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Don't make excuses! Discouraging neutralization to reduce IT policy violation., , , and . Comput. Secur., (2013)The Power of Introverts: Personality and Intelligence in Virtual Teams., , and . J. Manag. Inf. Syst., 39 (1): 102-129 (2022)Emergent Roles in Computer-Mediated Synchronous Virtual Groups.. HICSS, page 1-10. ScholarSpace, (2019)Overview and Guidance on Agile Development in Large Organizations., , , , , , and . Commun. Assoc. Inf. Syst., (2011)Organizational Violations of Externally Governed Privacy and Security Rules: Explaining and Predicting Selective Violations under Conditions of Strain and Excess., , and . J. Assoc. Inf. Syst., 17 (1): 4 (2016)Emergent roles in decision-making tasks using group chat.. CSCW, page 1505-1514. ACM, (2013)A new perspective on neutralization and deterrence: Predicting shadow IT usage., , and . Inf. Manag., 54 (8): 1023-1037 (2017)Perceptions of Risk and Security Concerns with Mobile Devices using Biometric vs Traditional Authentication Methods., and . AMCIS, Association for Information Systems, (2022)Sensitive to the Digital Touch? Exploring Sensory Processing Sensitivity and Its Impact on Anthropomorphized Products in E-Commerce., and . HICSS, page 1-10. ScholarSpace, (2021)Evaluating the Role of Trust in Adoption: A Conceptual Replication in the Context of Open Source Systems., , and . AIS Trans. Replication Res., (2018)