Author of the publication

Defending against Spear Phishing: Motivating Users through Fear appeal Manipulations.

, , and . PACIS, page 74. (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The role of the work itself: an empirical examination of intrinsic motivation's influence on IT workers attitudes and intentions., , and . SIGCPR, page 25-33. ACM, (2002)A Control-Alignment Model for Product Orientation in DevOps Teams-A Multinational Case Study., , , and . ICIS, Association for Information Systems, (2019)Conceptualizing Fluid Team Membership and Its Effects in IT Projects: A Preliminary Model., , and . ECIS, (2020)Moving Beyond Intentions and Toward the Theory of Trying: Effects of Work Environment and Gender on Post-Adoption Information Technology Use., and . MIS Q., 29 (3): 427-459 (2005)IS Employee Attitudes and Perceptions at Varying Levels of Software Process Maturity., , , and . MIS Q., 36 (2): 601-624 (2012)Unraveling the "paradox of the active user": Determinants of individuals' innovation with it-based work routines., , , and . AMCIS, Association for Information Systems, (2011)Conceptualizing models using multidimensional constructs: a review and guidelines for their use., , and . Eur. J. Inf. Syst., 21 (1): 22-48 (2012)Can we have fun @ work? The role of intrinsic motivation for utilitarian systems., , , and . Eur. J. Inf. Syst., 22 (3): 360-380 (2013)The Moderating Effects of Privacy Restrictiveness and Experience on Trusting Beliefs and Habit: An Empirical Test of Intention to Continue Using a Social Networking Website., , and . IEEE Trans. Engineering Management, 59 (4): 654-665 (2012)The Influence of Social Aversion and Institution-Based Trust on Computer Self-Efficacy, Computer Anxiety and Antecedents to IT Use., , , and . J. Organ. End User Comput., 26 (1): 1-26 (2014)