default search action
Sebastian Walter Schütz
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j12]Gaurav Bansal, Jason Thatcher, Sebastian Walter Schuetz:
Where authorities fail and experts excel: Influencing internet users' compliance intentions. Comput. Secur. 128: 103164 (2023) - [j11]David M. Hull, Sebastian Walter Schuetz, Paul Benjamin Lowry:
Tell me a story: The effects that narratives exert on meaningful-engagement outcomes in antiphishing training. Comput. Secur. 129: 103252 (2023) - 2022
- [j10]Sebastian Walter Schütz, Zachary R. Steelman, Rhonda A. Syler:
It's not just about accuracy: An investigation of the human factors in users' reliance on anti-phishing tools. Decis. Support Syst. 163: 113846 (2022) - [j9]Viswanath Venkatesh, Cheri Speier-Pero, Sebastian Walter Schütz:
Why do people shop online? A comprehensive framework of consumers' online shopping intentions and behaviors. Inf. Technol. People 35(5): 1590-1620 (2022) - [j8]Jens Förderer, Sebastian Walter Schütz:
Data Breach Announcements and Stock Market Reactions: A Matter of Timing? Manag. Sci. 68(10): 7298-7322 (2022) - 2021
- [j7]Sebastian Walter Schuetz, Tracy Ann Sykes, Viswanath Venkatesh:
Combating COVID-19 fake news on social media through fact checking: antecedents and consequences. Eur. J. Inf. Syst. 30(4): 376-388 (2021) - [j6]Hartmut Hoehle, Jia Wei, Sebastian Walter Schuetz, Viswanath Venkatesh:
User compensation as a data breach recovery action: a methodological replication and investigation of generalizability based on the Home Depot breach. Internet Res. 31(3): 765-781 (2021) - [j5]Sebastian Walter Schütz, Paul Benjamin Lowry, Daniel A. Pienta, Jason Bennett Thatcher:
Improving the Design of Information Security Messages by Leveraging the Effects of Temporal Distance and Argument Nature. J. Assoc. Inf. Syst. 22(5): 4 (2021) - 2020
- [j4]Sebastian Walter Schuetz, Viswanath Venkatesh:
Blockchain, adoption, and financial inclusion in India: Research opportunities. Int. J. Inf. Manag. 52: 101936 (2020) - [j3]Sebastian Walter Schuetz, Viswanath Venkatesh:
Research Perspectives: The Rise of Human Machines: How Cognitive Computing Systems Challenge Assumptions of User-System Interaction. J. Assoc. Inf. Syst. 21(2): 2 (2020) - [j2]Sebastian Walter Schütz, Paul Benjamin Lowry, Daniel A. Pienta, Jason Bennett Thatcher:
The Effectiveness of Abstract Versus Concrete Fear Appeals in Information Security. J. Manag. Inf. Syst. 37(3): 723-757 (2020)
2010 – 2019
- 2019
- [j1]Jens Förderer, Thomas Kude, Sebastian Walter Schütz, Armin Heinzl:
Knowledge boundaries in enterprise software platform development: Antecedents and consequences for platform governance. Inf. Syst. J. 29(1): 119-144 (2019) - [c6]Jia Wei, Sebastian Walter Schuetz:
A Social Network Analysis Perspective on Users' Vulnerability to Socially Engineered Phishing Attacks. ICIS 2019 - 2017
- [c5]Sebastian Walter Schütz, Rui Chen:
Off the leash: The meaning of non-punitive security approaches to organizational insiders. ICIS 2017 - 2016
- [c4]Sebastian Walter Schütz, Paul Benjamin Lowry, Jason Bennett Thatcher:
Defending against Spear Phishing: Motivating Users through Fear appeal Manipulations. PACIS 2016: 74 - 2014
- [c3]Jens Förderer, Thomas Kude, Sebastian Walter Schütz, Armin Heinzl:
Control versus Generativity: A Complex Adaptive Systems Perspective on Platforms. ICIS 2014 - [c2]Jens Förderer, Sebastian Walter Schütz, Thomas Kude:
Add-on Solution Success: A Configurational View on Knowledge Sharing in Digital Platforms. ICIS 2014 - 2013
- [c1]Sebastian Walter Schütz, Thomas Kude, Karl Michael Popp:
The Impact of Software-as-a-Service on Software Ecosystems. ICSOB 2013: 130-140
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:49 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint