Publications (15)
A2 Review article, Literature review, Systematic review
Toward a Unified Model of Information Security Policy Compliance (2018)
MIS Quarterly, 42 (1), 285-311, http://doi.org/10.25300/MISQ/2018/13853, OA
Moody, Gregory D.; Siponen, Mikko; Pahnila, Seppo
A2 Review article, Literature review, Systematic review
Using stage theorizing to make anti-phishing recommendations more effective (2018)
Information and Computer Security, 26 (4), 401-419, http://doi.org/10.1108/ics-06-2017-0040, OA
Tambe Ebot, Alain Claude
A2 Review article, Literature review, Systematic review
Artificial compound eye: a survey of the state-of-the-art (2017)
Artificial Intelligence Review, 48 (4), 573-603, http://doi.org/10.1007/s10462-016-9513-7
Wu, Sidong; Jiang, Tao; Zhang, Gexiang; Schoenemann, Brigitte; Neri, Ferrante; Zhu, Ming; Bu, Chunguang; Han, Jianda; Kuhnert, Klaus-Dieter
A2 Review article, Literature review, Systematic review
Archives of Computational Methods in Engineering, 24 (4), 703-750, http://doi.org/10.1007/s11831-016-9187-y
Greiner, David; Periaux, Jacques; Emperador, Jose M.; Galván, Blas; Winter, Gabriel
A2 Review article, Literature review, Systematic review
Machine-to-machine communication and research challenges : A survey (2017)
Wireless Personal Communications, 97 (3), 3569-3585, http://doi.org/10.1007/s11277-017-4686-1
Zhao, Ming; Kumar, Arun; Ristaniemi, Tapani; Chong, Peter Han Joo