Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Information Security by Words Alone: The Case for Strong Security Policies., , and . Int. J. Inf. Secur. Priv., 3 (2): 84-89 (2009)The size of the IT job market., , and . Commun. ACM, 51 (4): 107-109 (2008)Student Recognition and Awareness of Information Security in Course Learning from Management Information Systems and Computer Science Classes: An Empirical Investigation., , and . ICEB, page 1049-1053. Academic Publishers/World Publishing Corporation, (2004)Including a user interface management system (UIMS) in the performance relationship model., and . ACM SIGCHI Bull., 20 (4): 56-62 (1989)Tablet PCs for Teaching Information Systems Courses., , and . AMCIS, page 242. Association for Information Systems, (2005)Videostreaming, HorizonLive, and Tablet PCs for Teaching Information Systems Courses: Revisited., , and . AMCIS, page 11. Association for Information Systems, (2004)Synthesis and Analysis of Moore and Benbasat's PCI and Witte's Susceptibility and Severity of Threat Scales., and . AMCIS, page 196. Association for Information Systems, (2007)Comparing Security Perceptions of E-Commerce Users., , , and . AMCIS, page 288. Association for Information Systems, (2007)Skills in the MIS Job Market., , , and . AMCIS, page 255. Association for Information Systems, (2009)Using Streaming Technology and Tablet PCs for Teaching Information Systems., , and . AMCIS, page 417. Association for Information Systems, (2003)