Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Interaction Effect of Gender and Neutralization Techniques on Information Security Policy Compliance: An Ethical Perspective., and . AMCIS, Association for Information Systems, (2016)Trust Drops when Insiders Drop the Ball: The Role of Age, Gender, and Privacy Concern in Insider Data Breaches.. AMCIS, Association for Information Systems, (2017)Inverse Multipath Fingerprinting for Millimeter Wave V2I Beam Alignment., , , , and . CoRR, (2017)Trading Trust for Discount: Does Frugality Moderate the Impact of Privacy and Security Concerns?, and . AMCIS, page 417. Association for Information Systems, (2010)Security Concerns in the Nomological Network of Trust and Big 5: First Order Vs. Second Order.. ICIS, Association for Information Systems, (2011)Using EDCA to improve vehicle safety messaging., , , and . VNC, page 70-77. IEEE, (2012)Collaborative Perception for Automated Vehicles Leveraging Vehicle-to-Vehicle Communications., , , and . Intelligent Vehicles Symposium, page 1099-1106. IEEE, (2018)Comparing LIMERIC and DCC approaches for VANET channel congestion control., , , , , and . WiVeC, page 1-7. IEEE, (2014)Achieving weighted-fairnessin message rate-based congestion control for DSRC systems., and . WiVeC, page 1-5. IEEE, (2013)Impact of Measurement Noise on Millimeter Wave Beam Alignment Using Beam Subsets., , , , and . IEEE Wirel. Commun. Lett., 7 (5): 784-787 (2018)