Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Research Article Phishing Susceptibility: An Investigation Into the Processing of a Targeted Spear Phishing Email., , , , and . IEEE Trans. Prof. Commun., 55 (4): 345-362 (2012)The Impact of Helping Others in Coopetitive Crowdsourcing Communities., , , , and . J. Assoc. Inf. Syst., 22 (1): 7 (2021)Research Note - A Value-at-Risk Approach to Information Security Investment., , and . Inf. Syst. Res., 19 (1): 106-120 (2008)Mutual influences between message volume and emotion intensity on emerging infectious diseases: An investigation with microblog data., , , and . Inf. Manag., 57 (4): 103217 (2020)The impact of social media celebrities' posts and contextual interactions on impulse buying in social commerce., , , , and . Comput. Hum. Behav., (2021)Drivers of information security search behavior: An investigation of network attacks and vulnerability disclosures., , and . ACM Trans. Manag. Inf. Syst., 1 (1): 3:1-3:23 (2010)Continuous improvement of information security management: an organisational learning perspective., , , and . Eur. J. Inf. Syst., 32 (6): 1011-1032 (November 2023)Same Coin, Different Sides: Differential Impact of Social Learning on Two Facets of Music Piracy., , and . J. Manag. Inf. Syst., 28 (3): 343-384 (2012)Impact of Smartphones on Quality of Life: A Health Information Behavior Perspective., and . Inf. Syst. Frontiers, 22 (6): 1275-1290 (2020)Influence of Technology Affordance on the Adoption of Mobile Technologies for Diabetes Self-management., , and . ICSH, volume 10347 of Lecture Notes in Computer Science, page 104-115. Springer, (2017)