Author of the publication

Post-Acceptance Intentions and Behaviors: An Empirical Investigation of Information Technology Use and Innovation.

, , , and . JOEUC, 24 (1): 1-20 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Post-Acceptance Intentions and Behaviors: An Empirical Investigation of Information Technology Use and Innovation., , , and . JOEUC, 24 (1): 1-20 (2012)Research Note - Influence Techniques in Phishing Attacks: An Examination of Vulnerability and Resistance., , , , and . Information Systems Research, 25 (2): 385-400 (2014)Deception: Toward an Individualistic View of Group Support Systems., , and . J. AIS, 9 (10): 3 (2008)An Examination of Deception in Virtual Teams: Effects of Deception on Task Performance, Mutuality, and Trust., , and . IEEE Trans. Prof. Communication, 55 (1): 20-35 (2012)A quantitative textual analysis of three types of threat communication and subsequent maladaptive responses., , and . Computers & Security, (2019)An Investigation of Liking of Computers, Help Received, and Job Outcomes for Computer Workers., and . JOEUC, 21 (3): 60-79 (2009)The Decision to Share Information and Rumors: Examining the Role of Motivation in an Online Discussion Forum., and . CAIS, (2009)Blame Distribution Following Information Security Breaches., and . AMCIS, Association for Information Systems, (2018)Gender Differences in Deception and Its Detection Under Varying Electronic Media Conditions., , and . HICSS, IEEE Computer Society, (2005)Training to Detect Deception: An Experimental Investigation., , , , , , and . HICSS, IEEE Computer Society, (2004)