Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Taking Advantage of Using Professionally-Oriented Social Network Sites: The Role of Users' Actions and Profiles., and . AMCIS, Association for Information Systems, (2018)Consumer acceptance of biometrics for identity verification in financial transactions., , and . ECIS, page 1005-1016. (2009)Mobile Technologies and the Value Chain: Participants, Activities and Value Creation., , and . ICMB, page 8. IEEE Computer Society, (2006)Second Hand Technostress and its Determinants in the Context of Mobile Device Interruptions in Work Meetings., , and . ICMB, page 16. Association for Information Systems, (2013)The Influence of Product Type on Online Trust., and . Bled eConference, page 44. (2004)Developing and Validating a Scale for Perceived Usefulness for the Mobile Wallet., , and . WorldCIST, volume 206 of Advances in Intelligent Systems and Computing, page 469-476. Springer, (2013)Understanding the Factors That Influence the Perceived Severity of Cyber-bullying., , and . HCI (18), volume 8527 of Lecture Notes in Computer Science, page 133-144. Springer, (2014)Online Video Game Addiction: A Review and an Information Systems Research Agenda., and . AMCIS, Association for Information Systems, (2013)Establishing eTrust through Humanized Website Design., , and . Bled eConference, page 23. (2003)The Impact Of Cyberbullying On Users' Continuance Intention: The Roles Of Perceived Cyberbullying Severity And Coping Mechanisms., , and . ECIS, page 4. (2013)