From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Information Security by Words Alone: The Case for Strong Security Policies., , и . Int. J. Inf. Secur. Priv., 3 (2): 84-89 (2009)Including a user interface management system (UIMS) in the performance relationship model., и . ACM SIGCHI Bull., 20 (4): 56-62 (1989)Student Recognition and Awareness of Information Security in Course Learning from Management Information Systems and Computer Science Classes: An Empirical Investigation., , и . ICEB, стр. 1049-1053. Academic Publishers/World Publishing Corporation, (2004)The size of the IT job market., , и . Commun. ACM, 51 (4): 107-109 (2008)Comparing Security Perceptions of E-Commerce Users., , , и . AMCIS, стр. 288. Association for Information Systems, (2007)Synthesis and Analysis of Moore and Benbasat's PCI and Witte's Susceptibility and Severity of Threat Scales., и . AMCIS, стр. 196. Association for Information Systems, (2007)Tablet PCs for Teaching Information Systems Courses., , и . AMCIS, стр. 242. Association for Information Systems, (2005)Videostreaming, HorizonLive, and Tablet PCs for Teaching Information Systems Courses: Revisited., , и . AMCIS, стр. 11. Association for Information Systems, (2004)The IT/IS job market: a longitudinal perspective., , и . CPR, стр. 50-52. ACM, (2006)Skills in the MIS Job Market., , , и . AMCIS, стр. 255. Association for Information Systems, (2009)