Lennart Jaeger
Lennart Jaeger
Bestätigte E-Mail-Adresse bei stud.uni-frankfurt.de
Titel
Zitiert von
Zitiert von
Jahr
Information security awareness: literature review and integrative framework
L Jaeger
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018
122018
Unconscious on their Own Ignorance: Overconfidence in Information Security.
C Ament, L Jaeger
Proceedings of the 21st Pacific Asia Conference on Information Systems, 131, 2017
42017
System Characteristic or User Purpose?-A Multi-group Analysis on the Adoption of Online Shopping by Mobility Impaired and Unimpaired Users
J Kroenung, L Jaeger, A Kupetz
Proceedings of the 23rd European Conference on Information Systems, 2015
42015
Lessons learned from an information security incident: a practical recommendation to involve employees in information security
T Tatu, C Ament, L Jaeger
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018
32018
The Closer You Get the More Aware You Become–A Case Study about Psychological Distance to Information Security Incidents
L Jaeger, C Ament, A Eckhardt
Proceedings of the 38th International Conference on Information Systems, 2017
32017
Do Me a Favor “The Role of Social Relations for Information Security In-and Extra-Role Behavior
M Hartmann, L Jaeger, A Eckhardt
Proceedings of the 39th International Conference on Information Systems, 2018
22018
When Colleagues Fail: Examining the Role of Information Security Awareness on Extra-Role Security Behaviors.
L Jaeger, A Eckhardt
Proceedings of the 26th European Conference on Information Systems, 124, 2018
22018
Making Cues Salient: The Role of Security Awareness in Shaping Threat and Coping Appraisals
L Jaeger, A Eckhardt
Proceedings of the 25th European Conference on Information Systems, 2525, 2017
12017
A Neurosecurity Perspective on the Formation of Information Security Awareness - Proposing a Multi-method Approach
L Jaeger, A Eckhardt
Proceedings of the 20th Pacific Asia Conference on Information Systems, 64, 2016
12016
Me vs. cyber-me-Analyzing the effects of perceived stigma of physically disabled people on the disguise of the real self in virtual environments
L Jaeger, J Krönung, A Kupetz
Proceedings of the 34th International Conference on Information Systems …, 2013
12013
The role of deterrability for the effect of multi-level sanctions on information security policy compliance: results of a multigroup analysis
L Jaeger, A Eckhardt, J Kroenung
Information & Management, 103318, 2020
2020
Security-Related Cynicism: A Double-Edged Sword?
L Jaeger, G Mallmann
Proceedings of the 40th International Conference on Information Systems, 2019
2019
Security-Related Cynicism: Construct Development and Measurement
L Jaeger, GL Mallmann, A Eckhardt
Proceedings of the 13th Pre-ICIS Workshop on Information Security and Privacy 1, 2018
2018
Unmasking Emotions via Facial Expressions-First Insights on the Role of Emotional Valence for is Discontinuance.
VA Reibenspiess, L Jaeger, A Eckhardt
Proceedings of the 26th European Conference on Information Systems, 62, 2018
2018
The Impact of Purpose Transfer for Mobile IS Use: Insights of an Empirical Study.
K Jochmann, L Jaeger, V Reibenspiess, A Eckhardt, J Krönung
Proceedings of the 21st Pacific Asia on Information Systems, 188, 2017
2017
Transforming IS Ideas to IS Innovations-Adaptation Strategies based on a Community Appraisal Perspective
V Reibenspiess, A Eckhardt, L Jaeger, K Drechsler
Proceedings of the Twenty-Second DIGIT Workshop, 2017
2017
How Hedonic Systems Can Also Trigger Negative Emotions–First Insights of a Lab Experiment on Emotional Valence
V Reibenspiess, L Jaeger, A Eckhardt
Proceedings of the Twenty-First DIGIT Workshop, 2016
2016
What Faces Can (not) Tell–A Multi-Channel Analysis of Emotional Responses to Computer-Transferred Stimuli
A Eckhardt, J Kroenung, L Jaeger
Proceedings of the Twentieth DIGIT Workshop, 2015
2015
Global Aspects of Cybersecurity: A Vision of Preventive Paradigm
HR Nikkhah, V Grover, R Sabherwal, S Zavoyskiy, N Rizzo, S Goel, ...
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–19