Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Understanding Nuances of Privacy and Security in the Context of Information Systems., , and . AMCIS, Association for Information Systems, (2017)Overcoming Mixed-Gender Requirements Misspecification with the Modified Coherence Method., and . AMCIS, Association for Information Systems, (2012)Government of the People, By the People: A Look at Trust in eGovernment., , , , and . AMCIS, Association for Information Systems, (2012)A dual privacy decision model for online social networks., , and . Inf. Manag., 52 (8): 893-908 (2015)An imposed etic approach with Schwartz polar dimensions to explore cross-cultural use of social network services., , , , and . Inf. Manag., 57 (8): 103261 (2020)How do you feel about your friends? Understanding situational envy in online social networks., , and . Inf. Manag., 54 (5): 669-682 (2017)A contextualized comprehensive action determination model for predicting consumer electronics recommerce platform usage: A sequential mixed-methods approach., , and . Inf. Manag., 59 (3): 103617 (2022)Speak their Language: Designing Effective Messages to Improve Employees' Information Security Decision Making., , , and . Decis. Sci., 50 (2): 245-284 (2019)Personality, attitudes, and intentions: Predicting initial adoption of information security behavior., , and . Comput. Secur., (2015)Integrating elaboration likelihood model and herd theory in information security message persuasiveness., and . Comput. Secur., (2020)