Author of the publication

Cultivating cybersecurity learning: An integration of self-determination and flow.

, , , and . Comput. Secur., (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Teaching Social Media in Business., , , , and . J. Inf. Technol. Educ. Innov. Pract., (2015)Using Accountability Theory to Determine How Curiosity Affects Policy Compliance., , , and . AMCIS, Association for Information Systems, (2020)Don't Even Think About It! The Effects of Antineutralization, Informational, and Normative Communication on Information Security Compliance., , , and . J. Assoc. Inf. Syst., 19 (8): 3 (2018)Integrating Cognition with an Affective Lens to Better Understand Information Security Policy Compliance., , and . J. AIS, 20 (12): 4 (2019)Don't make excuses! Discouraging neutralization to reduce IT policy violation., , , and . Comput. Secur., (2013)Exploratory Study on Users' Behavior: Smartphone Usage., , and . AMCIS, Association for Information Systems, (2011)Is this a Joke? The Impact of Message Manipulations on Risk Perceptions., and . J. Comput. Inf. Syst., 55 (2): 9-19 (2015)Ethical Hacking: Addressing the Critical Shortage of Cybersecurity Talent., , , and . PACIS, page 321. (2018)Cultivating cybersecurity learning: An integration of self-determination and flow., , , and . Comput. Secur., (2020)Eating the Forbidden Fruit: Human Curiosity Entices Data Breaches., , and . AMCIS, Association for Information Systems, (2019)