Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Individual Adopter Differences Among Jordanian Technology Users., and . AMCIS, page 409. Association for Information Systems, (2009)Beyond Compliance: Empowering Employees' Extra-Role Security Behaviors in Dynamic Environments., , , and . AMCIS, Association for Information Systems, (2017)Satisfaction with employee relationship management systems: the impact of usefulness on systems quality perceptions., , and . Eur. J. Inf. Syst., 20 (2): 221-236 (2011)Social Media in Emerging Economies: A Cross-Cultural Comparison., and . IEEE Trans. Comput. Soc. Syst., 10 (3): 1160-1178 (2023)Gender Differences in Virtual Community Knowledge Sharing., , , and . Int. J. Knowl. Manag., 18 (1): 1-23 (February 2022)The Impact of Conflict Judgments between Developers and Testers in Software Development., , , and . J. Database Manag., 24 (4): 26-50 (2013)IP Teleconferencing in the Wired Classroom: Gratifications for Distance Education., and . J. Inf. Syst. Educ., 18 (2): 227-232 (2007)Understanding the Organizational Impact of Radio Frequency Identification Technology: A Holistic View., , and . Pac. Asia J. Assoc. Inf. Syst., 2 (2): 3 (2010)Exploring Dimensions of Mobile Information Technology Dependence., , , and . ICIS, page 179. Association for Information Systems, (2010)Spyware: a view from the (online) street., , and . Commun. ACM, 48 (8): 96-99 (2005)