Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Impact of Personal Dispositions on Privacy and Trust in Disclosing Health Information Online., , and . AMCIS, page 57. Association for Information Systems, (2007)Automotive radar using IEEE 802.11p signals., , , and . WCNC, page 1-6. IEEE, (2018)Energy-efficient power allocation in OFDM-based cognitive radio systems: A risk-return model., , , and . IEEE Trans. Wirel. Commun., 8 (12): 6078-6088 (2009)Trust Drops when Insiders Drop the Ball: The Role of Age, Gender, and Privacy Concern in Insider Data Breaches.. AMCIS, Association for Information Systems, (2017)Interaction Effect of Gender and Neutralization Techniques on Information Security Policy Compliance: An Ethical Perspective., and . AMCIS, Association for Information Systems, (2016)Internet Privacy Concerns Revisited: Oversight from Surveillance and Right To Be Forgotten as New Dimensions., and . Inf. Manag., 59 (3): 103618 (2022)Where authorities fail and experts excel: Influencing internet users' compliance intentions., , and . Comput. Secur., (May 2023)Internalization of Gender Roles: Challenges for Female CIOs in Ensuring IT Security Compliance., and . AMCIS, Association for Information Systems, (2023)Developing Multidimensional Scale for measuring Social Media Habit: A Nomological Examination in the Context of Cyberbullying., and . AMCIS, Association for Information Systems, (2021)Using EDCA to improve vehicle safety messaging., , , and . VNC, page 70-77. IEEE, (2012)