Author of the publication

The effects of bidder factors on online bidding strategies: A motivation-opportunity-ability (MOA) model.

, , , and . Decis. Support Syst., (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Proposing the control-reactance compliance model (CRCM) to explain opposing motivations to comply with organisational information security policies., and . Inf. Syst. J., 25 (5): 433-463 (2015)Cognitive-affective drivers of employees' daily compliance with information security policies: A multilevel, longitudinal study., and . Inf. Syst. J., 29 (1): 43-69 (2019)Leveraging fairness and reactance theories to deter reactive computer abuse following enhanced organisational information security policies: an empirical study of the influence of counterfactual reasoning and organisational trust., , , and . Inf. Syst. J., 25 (3): 193-273 (2015)Visual storytelling for improving the comprehension and utility in disseminating information systems research: Evidence from a quasi-experiment., , , and . Inf. Syst. J., 29 (6): 1153-1177 (2019)Developing and Measuring IS Scales Using Item Response Theory., , , and . ICIS, Association for Information Systems, (2013)Partial Least Squares (PLS) Structural Equation Modeling (SEM) for Building and Testing Behavioral Causal Theory: When to Choose It and How to Use It., and . IEEE Trans. Prof. Communication, 57 (2): 123-146 (2014)Understanding the Disclosure of Private Healthcare Information within Online Quantified Self 2.0 Platforms., , , and . PACIS, page 140. (2015)How do bidders' organism reactions mediate auction stimuli and bidder loyalty in online auctions? The case of Taobao in China., , and . Inf. Manag., 53 (5): 609-624 (2016)Examining the intended and unintended consequences of organisational privacy safeguards., , , and . Eur. J. Inf. Syst., 26 (1): 37-65 (2017)Model checking for E-business control and assurance., , , and . IEEE Trans. Syst. Man Cybern. Part C, 35 (3): 445-450 (2005)