Author of the publication

Effects of Fear appeals and point of reference on the persuasiveness of IT security communications.

, , , and . ISI, page 82-84. IEEE, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy by ReDesign: Alleviating Privacy Concerns for Third-Party Apps., , and . ICIS, Association for Information Systems, (2012)Information Disclosure and Online Social Networks: From the Case of Facebook News Feed Controversy to a Theoretical Understanding., , , and . AMCIS, page 503. Association for Information Systems, (2010)Argument Detection in Online Discussion: A Theory Based Approach., , , and . AMCIS, Association for Information Systems, (2016)Grand Challenges of Researching Adolescent Online Safety: A Family Systems Approach., , , and . AMCIS, Association for Information Systems, (2013)Privacy Considerations in Location-Based Advertising., and . Designing Ubiquitous Information Environments, volume 185 of IFIP, page 71-90. Springer, (2005)Privacy in the Age of Big Data: The Challenges and Opportunities for Privacy Research., , , , , , and . ICIS, Association for Information Systems, (2014)An Optimization Routing Algorithm for Green Communication in Underground Mines., , , , , and . Sensors, 18 (6): 1950 (2018)A novel radio map construction method with reduced human efforts for Wi-Fi localisation system., , , , , and . Int. J. Sens. Networks, 31 (2): 99-110 (2019)LS-SVM Based Two Step Commercial Short-Term Load Prediction., and . CSAE, page 7:1-7:6. ACM, (2019)An investigation of the word-processing software market war in South Korea: A game-theoretic approach., , and . Inf. Manag., 47 (2): 96-101 (2010)