default search action
Farkhondeh Hassandoust
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Farkhondeh Hassandoust, Angsana A. Techatassanasoontorn, Felix B. Tan:
Importance of IT and Role Identities in Information Systems Infusion. Inf. Syst. Frontiers 26(1): 333-367 (2024) - [j10]Tserendorj Chinbat, Samaneh Madanian, David Airehrour, Farkhondeh Hassandoust:
Machine learning cryptography methods for IoT in healthcare. BMC Medical Informatics Decis. Mak. 24(1): 153 (2024) - 2023
- [j9]Farkhondeh Hassandoust, Allen C. Johnston:
Peering through the lens of high-reliability theory: A competencies driven security culture model of high-reliability organisations. Inf. Syst. J. 33(5): 1212-1238 (2023) - [c13]Rhode Ghislaine Nguewo Ngassam, Roxana Ologeanu-Taddeï, Thao Bui Nguyen, Farkhondeh Hassandoust:
Adoption of Digital Allergy Card: A Mixed-Methods Approach. ACIS 2023 - 2022
- [j8]Farkhondeh Hassandoust, Angsana A. Techatassanasoontorn:
Antecedents of IS infusion behaviours: an integrated IT identity and empowerment perspective. Behav. Inf. Technol. 41(11): 2390-2414 (2022) - [j7]Farkhondeh Hassandoust, Maduka Subasinghage, Allen C. Johnston:
A neo-institutional perspective on the establishment of information security knowledge sharing practices. Inf. Manag. 59(1): 103574 (2022) - [c12]Farkhondeh Hassandoust, Allen C. Johnston, Roxana Ologeanu-Taddeï, Saeed Akhlaghpour:
From liking to not liking: A proposed experiment design to explore consumer perceptions of health wearable notifications. ACIS 2022: 60 - 2021
- [j6]Farkhondeh Hassandoust, Saeed Akhlaghpour, Allen C. Johnston:
Individuals' privacy concerns and adoption of contact tracing mobile applications in a pandemic: A situational privacy calculus perspective. J. Am. Medical Informatics Assoc. 28(3): 463-471 (2021) - [j5]Saeed Akhlaghpour, Farkhondeh Hassandoust, Farhad Fatehi, Andrew Burton-Jones, Andrew Hynd:
Learning from Enforcement Cases to Manage GDPR Risks. MIS Q. Executive 20(3): 4 (2021) - [c11]Abdelghany Mosa, Harminder Singh, Farkhondeh Hassandoust:
Disengagement from Risk Management Practices in Software Development Projects: Framing Effects. ACIS 2021: 39 - [c10]Farkhondeh Hassandoust, Allen C. Johnston, Tripti Singh:
Smart Pay-As-You-Live Services in Healthcare: A Balance Theory Perspective. ICIS 2021 - [c9]Farkhondeh Hassandoust, Subasinghage Maduka Nuwangi, Harminder Singh:
Information systems security - "How much is enough?". PACIS 2021: 254 - 2020
- [j4]Farkhondeh Hassandoust, Harminder Singh, Jocelyn E. Williams:
The Role of Contextualization in Individuals' Vulnerability to Phishing Attempts. Australas. J. Inf. Syst. 24 (2020) - [j3]Jingjing Zhang, Farkhondeh Hassandoust, Jocelyn E. Williams:
Online Customer Trust in the Context of the General Data Protection Regulation (GDPR). Pac. Asia J. Assoc. Inf. Syst. 12(1): 4 (2020) - [c8]Farkhondeh Hassandoust, Allen C. Johnston:
Deployment of Information Security Practices: The High Reliability Theory Perspective. ACIS 2020: 1 - [c7]Thai Pham, Farkhondeh Hassandoust:
The Role of External Mechanisms and Transformational Leadership in Information Security Policy Effectiveness: A Managerial Perspective of Financial Industry in Vietnam. ACIS 2020: 79 - [c6]Farkhondeh Hassandoust, Angsana A. Techatassanasoontorn, Harminder Singh:
Information Security Behaviour: A Critical Review and Research Directions. ECIS 2020 - [c5]Javad K. Pool, Farhad Fatehi, Farkhondeh Hassandoust, Saeed Akhlaghpour:
Health Data Privacy: Research Fronts, Hot Topics and Future Directions. EFMI-STC 2020: 167-171 - [c4]Farhad Fatehi, Farkhondeh Hassandoust, Ryan K. L. Ko, Saeed Akhlaghpour:
General Data Protection Regulation (GDPR) in Healthcare: Hot Topics and Research Fronts. MIE 2020: 1118-1122
2010 – 2019
- 2019
- [c3]Farkhondeh Hassandoust, Harminder Singh, Jocelyn E. Williams:
How Contextualisation Affects the Vulnerability of Individuals to Phishing Attempts. PACIS 2019: 163 - 2018
- [c2]Farkhondeh Hassandoust, Angsana A. Techatassanasoontorn:
Understanding Users' Information Security Awareness and Intentions: A full Nomology of Protection Motivation Theory. PACIS 2018: 93 - 2016
- [j2]Farkhondeh Hassandoust, Angsana A. Techatassanasoontorn, Felix B. Tan:
Factors Influencing the Infusion of Information Systems: A Literature Review. Pac. Asia J. Assoc. Inf. Syst. 8(1): 2 (2016) - 2015
- [c1]Farkhondeh Hassandoust, Angsana A. Techatassanasoontorn, Felix B. Tan:
The Impact of Individual's Identities on the Infusion of Information Systems within Organisations. ECIS 2015 - 2012
- [j1]Farkhondeh Hassandoust, Mehdy Farzaneh Kazerouni, Vimala Perumal:
Socio-Behavioral Factors in Virtual Knowledge Sharing: Theory of Reasoned Action and Theory of Planned Behavior Perspective. Int. J. Knowl. Based Organ. 2(2): 40-53 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint