Author of the publication

Improving the Design of Information Security Messages by Leveraging the Effects of Temporal Distance and Argument Nature.

, , , and . J. Assoc. Inf. Syst., 22 (5): 4 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.


Other publications of authors with the same name

Improving the Usability Evaluation Technique, Heuristic Evaluation, through the Use of Collaborative Software., and . AMCIS, page 284. Association for Information Systems, (2003)Understanding the Disclosure of Private Healthcare Information within Online Quantified Self 2.0 Platforms., , , and . PACIS, page 140. (2015)Partial Least Squares (PLS) Structural Equation Modeling (SEM) for Building and Testing Behavioral Causal Theory: When to Choose It and How to Use It., and . IEEE Trans. Prof. Communication, 57 (2): 123-146 (2014)Developing and Measuring IS Scales Using Item Response Theory., , , and . ICIS, Association for Information Systems, (2013)Visual storytelling for improving the comprehension and utility in disseminating information systems research: Evidence from a quasi-experiment., , , and . Inf. Syst. J., 29 (6): 1153-1177 (2019)Examining the intended and unintended consequences of organisational privacy safeguards., , , and . Eur. J. Inf. Syst., 26 (1): 37-65 (2017)How do bidders' organism reactions mediate auction stimuli and bidder loyalty in online auctions? The case of Taobao in China., , and . Inf. Manag., 53 (5): 609-624 (2016)Proposing the control-reactance compliance model (CRCM) to explain opposing motivations to comply with organisational information security policies., and . Inf. Syst. J., 25 (5): 433-463 (2015)Cognitive-affective drivers of employees' daily compliance with information security policies: A multilevel, longitudinal study., and . Inf. Syst. J., 29 (1): 43-69 (2019)Leveraging fairness and reactance theories to deter reactive computer abuse following enhanced organisational information security policies: an empirical study of the influence of counterfactual reasoning and organisational trust., , , and . Inf. Syst. J., 25 (3): 193-273 (2015)