From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Trust or consequences? Causal effects of perceived risk and subjective norms on cloud technology adoption., , и . Comput. Secur., (2017)IntegraL Connects Data, User and Scientists., , и . IASSIST, (2010)Ethical dilemma: Deception dynamics in computer-mediated group communication., , и . J. Assoc. Inf. Sci. Technol., 68 (12): 2729-2742 (2017)Consciousness of cyber defense: A collective activity system for developing organizational cyber awareness., и . Comput. Secur., (2021)An online game simulation environment for detecting potential deceptive insiders., , и . WSC, стр. 3222-3223. IEEE/ACM, (2015)Factors Affecting Individual Information Security Practices., , , и . CPR, стр. 135-144. ACM, (2015)Computer-Mediated Deception: Collective Language-action Cues as Stigmergic Signals for Computational Intelligence., и . HICSS, стр. 1-10. ScholarSpace / AIS Electronic Library (AISeL), (2018)Do You Speak Meme? A Dynamic Digital Language for the InformationSociety., , и . iConference (1), том 13971 из Lecture Notes in Computer Science, стр. 523-534. Springer, (2023)Ön the left side, there's nothing right. On the right side, there's nothing left: " Polarization of Political Opinion by News Media., , , , и . iConference, том 12051 из Lecture Notes in Computer Science, стр. 209-219. Springer, (2020)Guess who? An empirical study of gender deception and detection in computer-mediated communication., и . ASIST, том 50 из Proc. Assoc. Inf. Sci. Technol., стр. 1-4. Wiley, (2013)