Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Continuous improvement of information security management: an organisational learning perspective., , , and . Eur. J. Inf. Syst., 32 (6): 1011-1032 (November 2023)Digital Nudging and Transparency: An Experimental Study of Two Types of Recommendation Badges., , and . AMCIS, Association for Information Systems, (2023)Employees' information security policy compliance: A norm activation perspective., and . Decis. Support Syst., (2016)Can peers help reduce violations of information security policies? The role of peer monitoring., and . Eur. J. Inf. Syst., 32 (3): 508-528 (May 2023)Responding to identity theft: A victimization perspective., , , and . Decis. Support Syst., (2019)Mobile Health Privacy Concerns - A Systematic Review., , and . AMCIS, Association for Information Systems, (2018)The role of ethical climates in employee information security policy violations., , , and . Decis. Support Syst., (February 2024)Does stress reduce violation intention? Insights from eustress and distress processes on employee reaction to information security policies., , and . Eur. J. Inf. Syst., 32 (6): 1033-1051 (November 2023)Peers matter: The moderating role of social influence on information security policy compliance., , and . Inf. Syst. J., 30 (5): 791-844 (2020)Employee responses to information security related stress: Coping and violation intention., , and . Inf. Syst. J., 33 (3): 598-639 (May 2023)