Author of the publication

It's complicated: explaining the relationship between trust, distrust, and ambivalence in online transaction relationships using polynomial regression analysis and response surface analysis.

, , and . Eur. J. Inf. Syst., 26 (4): 379-413 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Influencing the success of spreadsheet development by novice users., , and . ICIS, page 319-324. Association for Information Systems, (1998)Online Ad Intrusiveness., , , and . HCI (4), volume 4553 of Lecture Notes in Computer Science, page 86-89. Springer, (2007)A Dyadic Analysis of Media Synchronicity and Task in Live Chat Online Customer Service (LCOCS)., and . AMCIS, page 363. Association for Information Systems, (2006)User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach., , and . Inf. Syst. Res., 20 (1): 79-98 (2009)Individual Centrality and Performance in Virtual R&D Groups: An Empirical Study., , and . Manag. Sci., 49 (1): 21-38 (2003)AMCIS 2002 Panels and Workshops I: Human-Computer Interaction Research in the MIS Discipline., , , , , and . Commun. Assoc. Inf. Syst., (2002)The Role of Human Computer Interaction in Management Information Systems Curricula: A Call to Action., , , , , and . Commun. Assoc. Inf. Syst., (2004)Understanding Inconsistent Employee Compliance with Information Security Policies Through the Lens of the Extended Parallel Process Model., , , , , and . Inf. Syst. Res., 32 (3): 1043-1065 (2021)Software Piracy in the Workplace: A Model and Empirical Test., , and . J. Manag. Inf. Syst., 20 (1): 153-177 (2003)How Endogenous Motivations Influence User Intentions: Beyond the Dichotomy of Extrinsic and Intrinsic User Motivations., , and . J. Manag. Inf. Syst., 25 (1): 267-299 (2008)