Author of the publication

Strategic value alignment for information security management: a critical success factor analysis.

, , , and . Inf. Comput. Secur., 26 (2): 150-170 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

IT Stereotyping and the CEO-CIO Headlock., , and . ICIS, Association for Information Systems, (2012)Coping with BYOD Security Threat: From Management Perspective., and . AMCIS, Association for Information Systems, (2015)Learning to cope with information security risks regarding mobile device loss or theft: An empirical examination., , , and . Inf. Manag., 52 (4): 506-517 (2015)Is Artificial Intelligence Attractive? An Empirical Study on User's Intention to Use AI-Enabled Applications., , and . HICSS, page 6550-6559. ScholarSpace, (2023)Understanding user behaviour in coping with security threats of mobile device loss and theft., , and . Int. J. Mob. Commun., 12 (6): 603-623 (2014)Understanding the Development and Diffusion of Mobile Commerce Technologies in China: A Biographical Study with an Actor-Network Theory Perspective., , , and . Int. J. Electron. Commer., 19 (4): 47-76 (2015)Understanding User's Behaviors in Coping with Security Threat of Mobile Devices Loss and Theft., and . HICSS, page 1393-1402. IEEE Computer Society, (2012)Strategic value alignment for information security management: a critical success factor analysis., , , and . Inf. Comput. Secur., 26 (2): 150-170 (2018)How Would Individuals Like to Use AI-Enabled Applications? An Empirical Study Based on HCI Framework., , and . AMCIS, Association for Information Systems, (2023)A Knowledge Extraction Approach for IT Tech-support Transcripts., , and . AMCIS, Association for Information Systems, (2023)