Author of the publication

Gender deception in asynchronous online communication: A path analysis.

, , , , and . Inf. Process. Manag., 53 (1): 21-41 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The effects of social media use on control of corruption and moderating role of cultural tightness-looseness., , , , and . Gov. Inf. Q., (2019)Gender deception in asynchronous online communication: A path analysis., , , , and . Inf. Process. Manag., 53 (1): 21-41 (2017)Is the responsibilization of the cyber security risk reasonable and judicious?, , , , and . Comput. Secur., (2018)Issues in wireless E-commerce., and . SIGecom Exch., 1 (1): 21-25 (2000)Social identity and trust in internet-based voting adoption., , , , and . Gov. Inf. Q., 35 (2): 195-209 (2018)Implications of Monitoring Mechanisms on Bring Your Own Device (BYOD) Adoption., , and . ICIS, Association for Information Systems, (2013)The Role of Technological and Social Factors on the Adoption of Mobile Payment Technologies., , and . AMCIS, page 333. Association for Information Systems, (2004)Understanding Nuances of Privacy and Security in the Context of Information Systems., , and . AMCIS, Association for Information Systems, (2017)Overcoming Mixed-Gender Requirements Misspecification with the Modified Coherence Method., and . AMCIS, Association for Information Systems, (2012)Government of the People, By the People: A Look at Trust in eGovernment., , , , and . AMCIS, Association for Information Systems, (2012)