Michelle L. Kaarst-Brown
2018
Trustworthiness attribution: Inquiry into insider threat detection
Shuyuan Mary Ho
|
Michelle L. Kaarst-Brown
|
Izak Benbasat
2018 Volume 69 Issue 2
2005
Sensitive information: A review and research agenda
E. Dale Thompson
|
Michelle L. Kaarst-Brown
2005 Volume 56 Issue 3
Search