Author of the publication

Seeking Foundations for the Science of Cyber Security.

, , and . Inf. Syst. Frontiers, 23 (2): 263-267 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Research Article Phishing Susceptibility: An Investigation Into the Processing of a Targeted Spear Phishing Email., , , , and . IEEE Trans. Prof. Commun., 55 (4): 345-362 (2012)Mutual influences between message volume and emotion intensity on emerging infectious diseases: An investigation with microblog data., , , and . Inf. Manag., 57 (4): 103217 (2020)The Impact of Helping Others in Coopetitive Crowdsourcing Communities., , , , and . J. Assoc. Inf. Syst., 22 (1): 7 (2021)Research Note - A Value-at-Risk Approach to Information Security Investment., , and . Inf. Syst. Res., 19 (1): 106-120 (2008)Continuous improvement of information security management: an organisational learning perspective., , , and . Eur. J. Inf. Syst., 32 (6): 1011-1032 (November 2023)Drivers of information security search behavior: An investigation of network attacks and vulnerability disclosures., , and . ACM Trans. Manag. Inf. Syst., 1 (1): 3:1-3:23 (2010)The impact of social media celebrities' posts and contextual interactions on impulse buying in social commerce., , , , and . Comput. Hum. Behav., (2021)Impact of Smartphones on Quality of Life: A Health Information Behavior Perspective., and . Inf. Syst. Frontiers, 22 (6): 1275-1290 (2020)Same Coin, Different Sides: Differential Impact of Social Learning on Two Facets of Music Piracy., , and . J. Manag. Inf. Syst., 28 (3): 343-384 (2012)Peer-recognition and Performance in Online Crowdsourcing Communities., , , and . HICSS, page 4262-4265. IEEE Computer Society, (2015)