Author of the publication

Adoption of Biometric Authentication Systems: Implications for Research and Practice in the Deployment of End-User Security Systems.

, , , and . J. Organ. Comput. Electron. Commer., 21 (3): 221-245 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adoption of Biometric Authentication Systems: Implications for Research and Practice in the Deployment of End-User Security Systems., , , and . J. Organ. Comput. Electron. Commer., 21 (3): 221-245 (2011)Improving direction-giving through utilization of an RFID-enabled kiosk., and . EIT, page 250-253. IEEE, (2008)Utilizing Structural Equation Modeling and Social Cognitive Career Theory to Identify Factors in Choice of IT as a Major., , and . TOCE, 14 (3): 19:1-19:19 (2014)Inclusion of Digital Entrance and Exit Tickets into an Undergraduate Cybersecurity Engineering Experiential Lab to Enhance Student Learning and Increase Self-assessment., , and . FIE, page 1-7. IEEE, (2023)High School Introductory Programming on Raspberry Pi Made from Scratch., and . Int. J. People Oriented Program., 6 (2): 33-45 (2017)Strategic Information Systems Security: Definition and Theoretical Model., , , and . AMCIS, Association for Information Systems, (2013)Taxonomy of Malicious Insiders: A Proof of Concept Study., , and . AMCIS, Association for Information Systems, (2016)The blocking effect of preconceived bias., , and . Decis. Support Syst., (2018)A Component-Based Framework for Visualization of Intrusion Detection Events., , and . Inf. Secur. J. A Glob. Perspect., 17 (2): 95-107 (2008)Personality and cognitive style as predictors of preference for working in virtual teams., , , and . Comput. Hum. Behav., 29 (4): 1825-1832 (2013)