Author of the publication

Toward User Evaluation of IT Security Certification Schemes: A Preliminary Framework.

, , and . SEC, volume 232 of IFIP, page 473-478. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Toward Successful Knowledge Transfer in Web-based Self-service for Information Technology Services., , and . PACIS, page 41. AISeL, (2005)Sustainable knowledge management systems: integration personalisation and contextualisation., and . ECIS, page 1084-1092. (2003)Ethical issues for internet use policy: balancing employer and employee perspectives.. Int. J. Technol. Manag., 54 (2/3): 288-303 (2011)Successful Web-Based IT Support Services: Service Provider Perceptions of Stakeholder-Oriented Challenges., , and . Int. J. E Serv. Mob. Appl., 1 (1): 1-20 (2009)Internet risks for companies.. Comput. Secur., 17 (2): 143-150 (1998)Developing Internet Security Policy for Organizations.. HICSS (4), page 350-. IEEE Computer Society, (1997)Adding Value to Online Privacy for Consumers: Remedying Deficiences in Online Privacy Policies with an Holistic Approac., , and . HICSS, page 206. IEEE Computer Society, (2003)Exploring Barriers In Expertise Seeking: Why Don'T They Ask An Expert?, , and . PACIS, page 77. Queensland University of Technology, (2011)Collaborative knowledge creation in electronic mail., and . Int. J. Knowl. Learn., 2 (3/4): 279-297 (2006)Optimising e-mail communication: the impact of seminar- and computer-based training., and . Int. J. Internet Enterp. Manag., 7 (2): 197-216 (2011)