Author of the publication

The Effectiveness of Abstract Versus Concrete Fear Appeals in Information Security.

, , , and . J. Manag. Inf. Syst., 37 (3): 723-757 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using the Control Balance Theory to Explain Social Media Deviance., , and . HICSS, page 1-10. ScholarSpace / AIS Electronic Library (AISeL), (2017)Designing Quantified-Self 2.0 Running Platform to Ensure Physical Activity Maintenance: the Role of Achievement Goals and Achievement Motivational Affordance., and . PACIS, page 184. (2016)Tell me a story: The effects that narratives exert on meaningful-engagement outcomes in antiphishing training., , and . Comput. Secur., (June 2023)Using multistage competing risks approaches to model web page transitions., , and . Internet Res., 27 (3): 650-669 (2017)Proposing the core contributor withdrawal theory (CCWT) to understand core contributor withdrawal from online peer-production communities., , , , and . Internet Res., 28 (4): 988-1028 (2018)It's complicated: explaining the relationship between trust, distrust, and ambivalence in online transaction relationships using polynomial regression analysis and response surface analysis., , and . Eur. J. Inf. Syst., 26 (4): 379-413 (2017)The Role of Extra-Role Behaviors and Social Controls in Information Security Policy Effectiveness., , , and . Inf. Syst. Res., 26 (2): 282-300 (2015)The Impact of Individualism - Collectivism, Social Presence, and Group Diversity on Group Decision Making Under Majority Influence., , , and . J. Manag. Inf. Syst., 23 (4): 53-80 (2007)Testing the Potential of RFID to Increase Supply-Chain Agility and to Mitigate the Bullwhip Effect., , and . Int. J. Appl. Logist., 1 (1): 48-66 (2010)Effects of Automated and Participative Decision Support in Computer-Aided Credibility Assessment., , and . J. Manag. Inf. Syst., 28 (1): 201-233 (2011)