Is this your profile?
Claim your Citation Index profile in order to display more information about you and gain access to Libraries services. Just create or connect your ORCID iD.
Create or connect your ORCID iD
Works (12)
2016 journal article
Corporate Sustainability Reporting and Stakeholder Concerns: Is There a Disconnect?
ACCOUNTING HORIZONS, 31(1), 83–102.
2014 journal article
Centralized end-to-end identity and access management and ERP systems: A multi-case analysis using the Technology Organization Environment framework
INTERNATIONAL JOURNAL OF ACCOUNTING INFORMATION SYSTEMS, 15(2), 149–165.
2010 journal article
How internet users' privacy concerns have evolved since 2002
IEEE Security & Privacy Magazine, 8(1), 21–27.
2007 journal article
HIPAA's effect on web site privacy policies
IEEE SECURITY & PRIVACY, 5(1), 45–52.
2006 journal article
An experimental economics approach toward quantifying online privacy choices
INFORMATION SYSTEMS FRONTIERS, 8(5), 363–374.
2006 journal article
Information privacy in the service sector: An exploratory study of health care and banking professionals
JOURNAL OF ORGANIZATIONAL COMPUTING AND ELECTRONIC COMMERCE, 16(2), 105–122.
2005 journal article
Examining Internet privacy policies within the context of user privacy values
IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, 52(2), 227–237.
2004 journal article
Financial privacy policies and the need for standardization
IEEE SECURITY & PRIVACY, 2(2), 36–45.
2004 journal article
Internet privacy law: a comparison between the United States and the European Union
COMPUTERS & SECURITY, 23(5), 400–412.
2003 journal article
A requirements taxonomy for reducing Web site privacy vulnerabilities
REQUIREMENTS ENGINEERING, 9(3), 169–185.
2003 journal article
Innovative Web use to learn about consumer behavior and online privacy
COMMUNICATIONS OF THE ACM, 46(4), 81–83.
2003 article
Precluding incongruous behavior by aligning software requirements with security and privacy policies
Anton, A. I., Earp, J. B., & Carter, R. A. (2003, November 1). INFORMATION AND SOFTWARE TECHNOLOGY, Vol. 45, pp. 967–977.