From post

Seeing the forest and the trees: A meta-analysis of information security policy compliance literature.

, , и . HICSS, стр. 1-10. ScholarSpace / AIS Electronic Library (AISeL), (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Sleight of Hand: Identifying Concealed Information by Monitoring Mouse-Cursor Movements., , , , и . J. Assoc. Inf. Syst., 20 (1): 3 (2019)Organizational information security policies: a review and research framework., , и . Eur. J. Inf. Syst., 26 (6): 605-641 (2017)Seeing the Forest and the Trees: A Meta-Analysis of the Antecedents to Information Security Policy Compliance., , и . MIS Q., (2019)Regulatory Facilitators and Impediments Impacting Cybersecurity Maturity., и . AMCIS, Association for Information Systems, (2022)Seeing the forest and the trees: A meta-analysis of information security policy compliance literature., , и . HICSS, стр. 1-10. ScholarSpace / AIS Electronic Library (AISeL), (2017)A Systems Approach to Countermeasures in Credibility Assessment Interviews., , , и . ICIS, Association for Information Systems, (2013)Maximizing Employee Compliance with Cybersecurity Policies., , и . MIS Q. Executive, 19 (3): 5 (2020)Too Busy to Be Manipulated: How Multitasking with Technology Improves Deception Detection in Collaborative Teamwork., , , , , и . J. Manag. Inf. Syst., 37 (2): 377-395 (2020)Improving Password Cybersecurity Through Inexpensive and Minimally Invasive Means: Detecting and Deterring Password Reuse Through Keystroke-Dynamics Monitoring and Just-in-Time Fear Appeals., , , и . Inf. Technol. Dev., 20 (2): 196-213 (2014)Man vs. machine: Investigating the effects of adversarial system use on end-user behavior in automated deception detection interviews., , и . Decis. Support Syst., (2016)