Author of the publication

An imposed etic approach with Schwartz polar dimensions to explore cross-cultural use of social network services.

, , , , and . Inf. Manag., 57 (8): 103261 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reactions to Abusive Supervision: Neutralization and IS Misuse., , , and . J. Comput. Inf. Syst., 62 (3): 632-641 (2022)Understanding Rumor Combating Behavior on Social Media., , , and . J. Comput. Inf. Syst., 62 (6): 1112-1124 (November 2022)Managers' and Employees' Differing Responses to Security Approaches., , and . J. Comput. Inf. Syst., 59 (3): 197-210 (2019)Threat Protection and Convenience: Antecedents of Cloud-Based Data Backup., , and . J. Comput. Inf. Syst., 55 (1): 83-91 (2014)A dual privacy decision model for online social networks., , and . Inf. Manag., 52 (8): 893-908 (2015)An imposed etic approach with Schwartz polar dimensions to explore cross-cultural use of social network services., , , , and . Inf. Manag., 57 (8): 103261 (2020)How do you feel about your friends? Understanding situational envy in online social networks., , and . Inf. Manag., 54 (5): 669-682 (2017)A contextualized comprehensive action determination model for predicting consumer electronics recommerce platform usage: A sequential mixed-methods approach., , and . Inf. Manag., 59 (3): 103617 (2022)Speak their Language: Designing Effective Messages to Improve Employees' Information Security Decision Making., , , and . Decis. Sci., 50 (2): 245-284 (2019)Integrating elaboration likelihood model and herd theory in information security message persuasiveness., and . Comput. Secur., (2020)