Author of the publication

Overcoming Digital Challenges: A Cross-Cultural Experimental Investigation of Recovering from Data Breaches.

, , , and . ICIS, Association for Information Systems, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Should i really do that? Using quantile regression to examine the impact of sanctions on information security policy compliance behavior., , , , and . Comput. Secur., (October 2023)Culture Matters - A Cross Cultural Examination of Information Security Behavior Theories.. CIISR@Wirtschaftsinformatik, volume 2966 of CEUR Workshop Proceedings, page 78-92. CEUR-WS.org, (2021)The Impact of Threat and Efficacy on Information Security Behavior: Applying an Extended Parallel Process Model to the Fear of Ransomware., , , and . HICSS, page 1-10. ScholarSpace, (2021)Reviewing the Interrelation Between Information Security and Culture: Toward an Agenda for Future Research., and . CIISR@Wirtschaftsinformatik, volume 2966 of CEUR Workshop Proceedings, page 52-77. CEUR-WS.org, (2021)Is Social Learning Always Helpful? Using Quantile Regression to Examine the Impact of Social Learning on Information Security Policy Compliance Behavior., , and . HICSS, page 4159-4168. ScholarSpace, (2023)Towards a Taxonomy of Information Security Policy Non-Compliance Behavior., , and . HICSS, page 1-10. ScholarSpace, (2022)How Employees Learn Information Security Policy Compliance Behavior: Toward a Social Learning Perspective., , and . ECIS, (2022)Fostering Information Security Compliance: Comparing the Predictive Power of Social Learning Theory and Deterrence Theory., , , , , and . AMCIS, Association for Information Systems, (2019)Overcoming Digital Challenges: A Cross-Cultural Experimental Investigation of Recovering from Data Breaches., , , and . ICIS, Association for Information Systems, (2020)How do employees learn security behavior? Examining the influence of individual cultural values and social learning on ISP compliance behavior., , and . HICSS, page 1-10. ScholarSpace, (2021)