Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Research Note - Influence Techniques in Phishing Attacks: An Examination of Vulnerability and Resistance., , , , and . Information Systems Research, 25 (2): 385-400 (2014)Post-Acceptance Intentions and Behaviors: An Empirical Investigation of Information Technology Use and Innovation., , , and . JOEUC, 24 (1): 1-20 (2012)Deception: Toward an Individualistic View of Group Support Systems., , and . J. AIS, 9 (10): 3 (2008)An Examination of Deception in Virtual Teams: Effects of Deception on Task Performance, Mutuality, and Trust., , and . IEEE Trans. Prof. Communication, 55 (1): 20-35 (2012)A quantitative textual analysis of three types of threat communication and subsequent maladaptive responses., , and . Computers & Security, (2019)Checking the manipulation checks in information security research.. Inf. & Comput. Security, 23 (1): 20-30 (2015)An Investigation of Liking of Computers, Help Received, and Job Outcomes for Computer Workers., and . JOEUC, 21 (3): 60-79 (2009)Training to Detect Deception: An Experimental Investigation., , , , , , and . HICSS, IEEE Computer Society, (2004)Gender Differences in Deception and Its Detection Under Varying Electronic Media Conditions., , and . HICSS, IEEE Computer Society, (2005)Blame Distribution Following Information Security Breaches., and . AMCIS, Association for Information Systems, (2018)