Author of the publication

Why Do Adults Engage in Cyberbullying on Social Media? An Integration of Online Disinhibition and Deindividuation Effects with the Social Structure and Social Learning Model.

, , , and . Inf. Syst. Res., 27 (4): 962-986 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Employees' Adherence to Information Security Policies: An Empirical Study., , and . SEC, volume 232 of IFIP, page 133-144. Springer, (2007)Updating the Philosophy of Middle-Range Theories: Implications for IS., and . PACIS, page 128. (2018)Information security standards focus on the existence of process, not its content.. Commun. ACM, 49 (8): 97-100 (2006)Ethically Aligned Design of Autonomous Systems: Industry viewpoint and an empirical study., , , , and . CoRR, (2019)Understanding the inward emotion-focused coping strategies of individual users in response to mobile malware threats., , and . Behav. Inf. Technol., 41 (13): 2835-2859 (2022)Gray-Area Phenomenon In Information Systems Development: A Call For Research., , and . PACIS, page 198. Queensland University of Technology, (2011)Attitudes of sixth form female students towards the IT field., and . ECIS, page 859-872. (2006)On the Role of Human Mortality in Information System Security: From the Problems of Descriptivism to Non-Descriptive Foundations.. IRMJ, 14 (4): 15-23 (2001)Unauthorized copying of software and levels of moral development: a literature analysis and its implications for research and practice., and . Inf. Syst. J., 14 (4): 387-407 (2004)Demystifying the Influential IS Legends of Positivism: Response to Lee's Commentary., and . J. Assoc. Inf. Syst., 21 (6): 1 (2020)