-
1
-
-
0038601673
-
New directions on agile methods: A comparative analysis
-
IEEE, Portland, OR
-
ABRAHAMSSON P, WARSTA J, SIPONEN MT and RONKAINEN J (2003) New directions on agile methods: a comparative analysis. Software Engineering, Proceedings of the 25th International Conference on IEEE. IEEE, Portland, OR, pp. 244-254.
-
(2003)
Software Engineering, Proceedings of the 25th International Conference on IEEE
, pp. 244-254
-
-
Abrahamsson, P.1
Warsta, J.2
Siponen, M.T.3
Ronkainen, J.4
-
2
-
-
34248641798
-
The privacy lawyer: Cyberloafing's drain on productivity
-
[WWWdocument]
-
AFTAB P (2003) The privacy lawyer: cyberloafing's drain on productivity. Information Week, [WWWdocument], http://www.informationweek.com/news/16000567.
-
(2003)
Information Week
-
-
Aftab, P.1
-
5
-
-
77957077814
-
Practicing safe computing: A multimethod empirical examination of home computer user security behavior intentions
-
ANDERSON C and AGARWAL R (2010) Practicing safe computing: a multimethod empirical examination of home computer user security behavior intentions. MIS Quarterly 34(3), 613-643.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 613-643
-
-
Anderson, C.1
Agarwal, R.2
-
6
-
-
84933494181
-
The rationality of sexual offending: Testing a deterrence/rational choice conception of sexual assault
-
BACHMAN R, PATERNOSTER R and WARD S (1992) The rationality of sexual offending: testing a deterrence/rational choice conception of sexual assault. Law & Society Review 26(2), 343-372.
-
(1992)
Law & Society Review
, vol.26
, Issue.2
, pp. 343-372
-
-
Bachman, R.1
Paternoster, R.2
Ward, S.3
-
7
-
-
0002624070
-
Empirical research in information systems: The practice of relevance
-
BENBASAT I and ZMUD R (1999) Empirical research in information systems: the practice of relevance. MIS Quarterly 23(1), 3-16.
-
(1999)
MIS Quarterly
, vol.23
, Issue.1
, pp. 3-16
-
-
Benbasat, I.1
Zmud, R.2
-
8
-
-
67650100804
-
If someone is watching, i'll do what i'm asked: Mandatoriness, control, and information security
-
BOSS S, KIRSCH L, ANGERMEIER I, SHINGLER R and BOSS R (2009) If someone is watching, i'll do what i'm asked: mandatoriness, control, and information security. European Journal of Information Systems 18(2), 151-164.
-
(2009)
European Journal of Information Systems
, vol.18
, Issue.2
, pp. 151-164
-
-
Boss, S.1
Kirsch, L.2
Angermeier, I.3
Shingler, R.4
Boss, R.5
-
9
-
-
9744260316
-
Validation in information systems research: A state of - The-art assessment
-
BOUDREAU M, GEFEN D and STRAUB DW (2001) Validation in information systems research: a state of-the-art assessment. MIS Quarterly 25(1), 1-26.
-
(2001)
MIS Quarterly
, vol.25
, Issue.1
, pp. 1-26
-
-
Boudreau, M.1
Gefen, D.2
Straub, D.W.3
-
10
-
-
77957061746
-
Information security policy compliance: An empirical study of rationality-based beliefs and information security awareness
-
BULGURCU B, CAVUSOGLU H and BENBASAT I (2010) Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness. MIS Quarterly 34(3), 523-548.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 523-548
-
-
Bulgurcu, B.1
Cavusoglu, H.2
Benbasat, I.3
-
13
-
-
61349159889
-
Perceptions of information security in the workplace: Linking information security climate to compliant behavior
-
CHAN M, WOON I and KANKANHALLI A (2005) Perceptions of information security in the workplace: linking information security climate to compliant behavior. Journal of Information Privacy and Security 1(3), 18-41.
-
(2005)
Journal of Information Privacy and Security
, vol.1
, Issue.3
, pp. 18-41
-
-
Chan, M.1
Woon, I.2
Kankanhalli, A.3
-
14
-
-
0003293068
-
Criminology, routine activity and rational choice
-
(CLARKE R and FELSON M, Eds) Transaction Publishers, New Brunswick, NJ
-
CLARKE R and FELSON M (1993) Criminology, routine activity and rational choice. In Routine Activity and Rational Choice (CLARKE R and FELSON M, Eds), pp. 1-14, Transaction Publishers, New Brunswick, NJ.
-
(1993)
Routine Activity and Rational Choice
, pp. 1-14
-
-
Clarke, R.1
Felson, M.2
-
15
-
-
67649551429
-
User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach
-
D'ARCY J, HOVAV A and GALLETTA D (2009) User awareness of security countermeasures and its impact on information systems misuse: a deterrence approach. Information Systems Research 20(1), 79-98.
-
(2009)
Information Systems Research
, vol.20
, Issue.1
, pp. 79-98
-
-
D'arcy, J.1
Hovav, A.2
Galletta, D.3
-
17
-
-
81255163048
-
Understanding nonmalicious security violations in the workplace: A composite behavior model
-
GUO K, YUFEI Y, ARCHER N and CONNELLY C (2011) Understanding nonmalicious security violations in the workplace: a composite behavior model. Journal of Management Information Systems 28(2), 203-236.
-
(2011)
Journal of Management Information Systems
, vol.28
, Issue.2
, pp. 203-236
-
-
Guo, K.1
Yufei, Y.2
Archer, N.3
Connelly, C.4
-
19
-
-
0000917858
-
The effect of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions
-
HARRINGTON SJ (1996) The effect of codes of ethics and personal denial of responsibility on computer abuse judgments and intentions. MIS Quarterly 20(3), 257-278.
-
(1996)
MIS Quarterly
, vol.20
, Issue.3
, pp. 257-278
-
-
Harrington, S.J.1
-
20
-
-
67650152666
-
Protection motivation and deterrence: A framework for security policy compliance in organizations
-
HERATH T and RAO HR (2009a) Protection motivation and deterrence: a framework for security policy compliance in organizations. European Journal of Information Systems 18(2), 106-125.
-
(2009)
European Journal of Information Systems
, vol.18
, Issue.2
, pp. 106-125
-
-
Herath, T.1
Rao, H.R.2
-
21
-
-
67349144062
-
Encouraging information security behaviors in organizations: Role of penalties, pressures and perceived effectiveness
-
HERATH T and RAO HR (2009b) Encouraging information security behaviors in organizations: role of penalties, pressures and perceived effectiveness. Decision Support Systems 47(2), 54-165.
-
(2009)
Decision Support Systems
, vol.47
, Issue.2
, pp. 54-165
-
-
Herath, T.1
Rao, H.R.2
-
22
-
-
84860524113
-
The centrality of low self-control in internal computer offenses
-
(VANCE A, Ed), (sponsored by IFIP WG8.11/WG11.13) Bentley University, Waltham, MA
-
HU Q, XU Z, DINEV T and LING H (2010) The centrality of low self-control in internal computer offenses. In Proceedings of the Dewald Roode Information Security Research Workshop (VANCE A, Ed), (sponsored by IFIP WG8.11/WG11.13) Bentley University, Waltham, MA.
-
(2010)
Proceedings of the Dewald Roode Information Security Research Workshop
-
-
Hu, Q.1
Xu, Z.2
Dinev, T.3
Ling, H.4
-
23
-
-
79959944364
-
Does deterrence really work in reducing information security policy violations by employees?
-
HU Q, XU Z, DINEV T and LING H (2011) Does deterrence really work in reducing information security policy violations by employees? Communications of the ACM 54(6), 54-60.
-
(2011)
Communications of the ACM
, vol.54
, Issue.6
, pp. 54-60
-
-
Hu, Q.1
Xu, Z.2
Dinev, T.3
Ling, H.4
-
24
-
-
84970331544
-
Measurement in cross-cultural psychology: A review and comparison of strategies
-
HUI C and TRIANDIS H (1985) Measurement in cross-cultural psychology: a review and comparison of strategies. Journal of Cross-Cultural Psychology 16(2), 131-152.
-
(1985)
Journal of Cross-Cultural Psychology
, vol.16
, Issue.2
, pp. 131-152
-
-
Hui, C.1
Triandis, H.2
-
25
-
-
31944451470
-
Factorial survey methods for studying beliefs and judgments
-
JASSO G (2006) Factorial survey methods for studying beliefs and judgments. Sociological Methods & Research 34(3), 334-423.
-
(2006)
Sociological Methods & Research
, vol.34
, Issue.3
, pp. 334-423
-
-
Jasso, G.1
-
26
-
-
77957057727
-
Fear appeals and information security behaviors: An empirical study
-
JOHNSTON A and WARKENTIN M (2010a) Fear appeals and information security behaviors: an empirical study. MIS Quarterly 34(3), 549-566.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 549-566
-
-
Johnston, A.1
Warkentin, M.2
-
27
-
-
77956282930
-
The influence of perceived source credibility on end user attitudes and intentions to comply with recommended IT actions
-
JOHNSTON A andWARKENTIN M (2010b) The influence of perceived source credibility on end user attitudes and intentions to comply with recommended IT actions. Journal of Organizational and End User Computing 22(3), 1-21.
-
(2010)
Journal of Organizational and End User Computing
, vol.22
, Issue.3
, pp. 1-21
-
-
Johnston, A.1
Warkentin, M.2
-
28
-
-
80052902327
-
Toward a new meta-theory for designing information systems (IS) security training approaches
-
Article 3
-
KARJALAINEN M and SIPONEN M (2011) Toward a new meta-theory for designing information systems (IS) security training approaches. Journal of the Association for Information Systems 12(8), Article 3.
-
(2011)
Journal of the Association for Information Systems
, vol.12
, Issue.8
-
-
Karjalainen, M.1
Siponen, M.2
-
29
-
-
0024447728
-
The deterrent effect of perceived certainty and severity of punishment revisited
-
KLEPPER S and NAGIN D (1989) The deterrent effect of perceived certainty and severity of punishment revisited. Criminology 27(4), 721-746.
-
(1989)
Criminology
, vol.27
, Issue.4
, pp. 721-746
-
-
Klepper, S.1
Nagin, D.2
-
31
-
-
0141860786
-
Generalizing generalizability in information systems research
-
LEE A and BASKERVILLE R (2003) Generalizing generalizability in information systems research. Information Systems Research 14(3), 221-243.
-
(2003)
Information Systems Research
, vol.14
, Issue.3
, pp. 221-243
-
-
Lee, A.1
Baskerville, R.2
-
32
-
-
2342489402
-
An integrative model of computer abuse based on social control and general deterrence theories
-
LEE SM, LEE SG and YOO S (2004) An integrative model of computer abuse based on social control and general deterrence theories. Information & Management 41(6), 707-718.
-
(2004)
Information & Management
, vol.41
, Issue.6
, pp. 707-718
-
-
Lee, S.M.1
Lee, S.G.2
Yoo, S.3
-
33
-
-
12444325211
-
Force of habit and information systems usage: Theory and initial validation
-
LIMAYEM M and HIRT SG (2003) Force of habit and information systems usage: theory and initial validation. Journal of the AIS 4(1), 65-97.
-
(2003)
Journal of the AIS
, vol.4
, Issue.1
, pp. 65-97
-
-
Limayem, M.1
Hirt, S.G.2
-
34
-
-
80051733015
-
Construct measurement and validation procedures in MIS and behavioral research: Integrating new and existing techniques
-
MACKENZIE SB, PODSAKOFF PM and PODSAKOFF NP (2011) Construct measurement and validation procedures in MIS and behavioral research: integrating new and existing techniques. MIS Quarterly 35(2), 293-334.
-
(2011)
MIS Quarterly
, vol.35
, Issue.2
, pp. 293-334
-
-
Mackenzie, S.B.1
Podsakoff, P.M.2
Podsakoff, N.P.3
-
35
-
-
84965874692
-
Dilemmatics: The study of research choices and dilemmas
-
MCGRATH J (1981) Dilemmatics: the study of research choices and dilemmas. American Behavioral Scientist 25(2), 179-210.
-
(1981)
American Behavioral Scientist
, vol.25
, Issue.2
, pp. 179-210
-
-
McGrath, J.1
-
36
-
-
73449149291
-
Development of an instrument to measure the perceptions of adopting an information technology innovation
-
MOORE G and BENBASAT I (1991) Development of an instrument to measure the perceptions of adopting an information technology innovation. Information Systems Research 2(3), 192-222.
-
(1991)
Information Systems Research
, vol.2
, Issue.3
, pp. 192-222
-
-
Moore, G.1
Benbasat, I.2
-
37
-
-
67650143327
-
What levels of moral reasoning and values explain adherence to information security policies? An empirical study
-
MYYRY L, SIPONEN M, PAHNILA S, VARTIAINEN T and VANCE A (2009) What levels of moral reasoning and values explain adherence to information security policies? An empirical study. European Journal of Information Systems 18(2), 126-139.
-
(2009)
European Journal of Information Systems
, vol.18
, Issue.2
, pp. 126-139
-
-
Myyry, L.1
Siponen, M.2
Pahnila, S.3
Vartiainen, T.4
Vance, A.5
-
38
-
-
61349092288
-
Studying users' computer security behavior using the health belief model
-
NG BY, KANKANHALLI A and XU Y (2009) Studying users' computer security behavior using the health belief model. Decision Support Systems 46(4), 815-825.
-
(2009)
Decision Support Systems
, vol.46
, Issue.4
, pp. 815-825
-
-
By, N.G.1
Kankanhalli, A.2
Xu, Y.3
-
39
-
-
0005214302
-
The aim and structure of applied research
-
NIINILUOTO I (1993) The aim and structure of applied research. Erkenntnis 38(1), 1-21.
-
(1993)
Erkenntnis
, vol.38
, Issue.1
, pp. 1-21
-
-
Niiniluoto, I.1
-
40
-
-
23944438620
-
A review of the empirical ethical decision-making literature: 1996-2003
-
O'FALLON M and BUTTERFIELD K (2005) A review of the empirical ethical decision-making literature: 1996-2003. Journal of Business Ethics 59(4), 375-413.
-
(2005)
Journal of Business Ethics
, vol.59
, Issue.4
, pp. 375-413
-
-
O'fallon, M.1
Butterfield, K.2
-
41
-
-
39749168050
-
Employees' behavior towards IS security policy compliance
-
Los Alamitos, CA, IEEE Computer Society Press
-
PAHNILA S, SIPONEN M and MAHMOOD A (2007) Employees' behavior towards IS security policy compliance. In Proceedings of the 40th Hawaii International Conference on System Sciences. Los Alamitos, CA, IEEE Computer Society Press, pp. 156-166.
-
(2007)
Proceedings of the 40th Hawaii International Conference on System Sciences
, pp. 156-166
-
-
Pahnila, S.1
Siponen, M.2
Mahmood, A.3
-
43
-
-
38549116762
-
Specifying formative constructs in IS research
-
PETTER S, STRAUB D and RAI A (2007) Specifying formative constructs in IS research. MIS Quarterly 31(4), 623-656.
-
(2007)
MIS Quarterly
, vol.31
, Issue.4
, pp. 623-656
-
-
Petter, S.1
Straub, D.2
Rai, A.3
-
44
-
-
0030521693
-
Sanction threats and appeals to morality: Testing a rational choice model of corporate crime
-
PATERNOSTER R and SIMPSON S (1996) Sanction threats and appeals to morality: testing a rational choice model of corporate crime. Law and Society Review 30(3), 549-584.
-
(1996)
Law and Society Review
, vol.30
, Issue.3
, pp. 549-584
-
-
Paternoster, R.1
Simpson, S.2
-
45
-
-
27844606454
-
Integrating the desire-forcontrol and rational choice in a corporate crime context
-
PIQUERO NL, EXUM ML and SIMPSON SS (2005) Integrating the desire-forcontrol and rational choice in a corporate crime context. Justice Quarterly 22(2), 252-280.
-
(2005)
Justice Quarterly
, vol.22
, Issue.2
, pp. 252-280
-
-
Piquero, N.L.1
Exum, M.L.2
Simpson, S.S.3
-
46
-
-
77958615428
-
-
PRICEWATERHOUSECOOPERS. [WWW document] (accessed 31 May 2010)
-
PRICEWATERHOUSECOOPERS (2010) Information security breaches survey 2010. [WWW document], http://www.pwc.co.uk/pdf/isbs-survey-2010-technical-report.pdf (accessed 31 May 2010).
-
(2010)
Information Security Breaches Survey 2010
-
-
-
47
-
-
78650770842
-
Improving employees' compliance through information systems security training: An action research study
-
PUHAKAINEN P and SIPONEN M (2010) Improving employees' compliance through information systems security training: an action research study. MIS Quarterly 34(4), 757-778.
-
(2010)
MIS Quarterly
, vol.34
, Issue.4
, pp. 757-778
-
-
Puhakainen, P.1
Siponen, M.2
-
48
-
-
21844526560
-
A typology of deviant workplace behaviors: A multidimensional scaling study
-
ROBINSON S and BENNETT R (1995) A typology of deviant workplace behaviors: a multidimensional scaling study. Academy of Management Journal 38(2), 555-572.
-
(1995)
Academy of Management Journal
, vol.38
, Issue.2
, pp. 555-572
-
-
Robinson, S.1
Bennett, R.2
-
49
-
-
84884295285
-
Riding the wave: Past trends and future directions for health IT research
-
ROMANOW D, CHO S and STRAUB D (2012) Riding the wave: past trends and future directions for health IT research. MIS Quarterly 36(3), iii-x.
-
(2012)
MIS Quarterly
, vol.36
, Issue.3
-
-
Romanow, D.1
Cho, S.2
Straub, D.3
-
50
-
-
0002196438
-
Vignette analysis: Uncovering the normative structure of complex judgments
-
(ROBERT KM, JAMES SC and PETER HR Eds), Free Press, New York
-
ROSSI P (1979) Vignette analysis: uncovering the normative structure of complex judgments. In (ROBERT KM, JAMES SC and PETER HR Eds) Qualitative and Quantitative Social Research: Papers in honor of Paul F. Lazarsfeld, pp. 176-186, Free Press, New York.
-
(1979)
Qualitative and Quantitative Social Research: Papers in Honor of Paul F. Lazarsfeld
, pp. 176-186
-
-
Rossi, P.1
-
51
-
-
84857005992
-
Towards the improved treatment of generalization of knowledge claims in IS research: Drawing general conclusions from samples
-
SEDDON P and SCHEEPERS R (2011) Towards the improved treatment of generalization of knowledge claims in IS research: drawing general conclusions from samples. European Journal of Information Systems 21(1), 6-21.
-
(2011)
European Journal of Information Systems
, vol.21
, Issue.1
, pp. 6-21
-
-
Seddon, P.1
Scheepers, R.2
-
53
-
-
0033683516
-
A conceptual foundation for organizational IS security awareness
-
SIPONEN MT (2000) A conceptual foundation for organizational IS security awareness. Information Management & Computer Security 8(1), 31-41.
-
(2000)
Information Management & Computer Security
, vol.8
, Issue.1
, pp. 31-41
-
-
Siponen, M.T.1
-
54
-
-
39749091576
-
IS security design theory framework and six approaches to the application of ISPs and guidelines
-
SIPONEN MT and IIVARI J (2006) IS security design theory framework and six approaches to the application of ISPs and guidelines. Journal of the Association for Information Systems 7(7), 445-472.
-
(2006)
Journal of the Association for Information Systems
, vol.7
, Issue.7
, pp. 445-472
-
-
Siponen, M.T.1
Iivari, J.2
-
55
-
-
77149132467
-
Why employees don't comply with information security policies: An empirical investigation
-
SIPONEN MT, MAHMOOD A and PAHNILA S (2010) Why employees don't comply with information security policies: an empirical investigation. IEEE Computer 43(10), 64-71.
-
(2010)
IEEE Computer
, vol.43
, Issue.10
, pp. 64-71
-
-
Siponen, M.T.1
Mahmood, A.2
Pahnila, S.3
-
56
-
-
77957068563
-
Neutralization: New insights into the problem of employee information systems security policy violations
-
SIPONEN MT and VANCE A (2010) Neutralization: new insights into the problem of employee information systems security policy violations. MIS Quarterly 34(3), 487-502.
-
(2010)
MIS Quarterly
, vol.34
, Issue.3
, pp. 487-502
-
-
Siponen, M.T.1
Vance, A.2
-
57
-
-
84870054732
-
New insights into the problem of software piracy: The effects of neutralization, shame, and moral beliefs
-
SIPONEN MT, VANCE A and WILLISON R (2012) New insights into the problem of software piracy: the effects of neutralization, shame, and moral beliefs. Information & Management 49(7-8), 334-341.
-
(2012)
Information & Management
, vol.49
, Issue.7-8
, pp. 334-341
-
-
Siponen, M.T.1
Vance, A.2
Willison, R.3
-
58
-
-
80054707541
-
Out of fear or desire? Toward a better understanding of employees' motivation to follow IS security policies
-
SON J (2011) Out of fear or desire? Toward a better understanding of employees' motivation to follow IS security policies. Information & Management 48(7), 296-302.
-
(2011)
Information & Management
, vol.48
, Issue.7
, pp. 296-302
-
-
Son, J.1
-
59
-
-
80051729085
-
Special research commentary series on advanced methodological thinking for quantitative research
-
STAFFORD T (2011) Special research commentary series on advanced methodological thinking for quantitative research. MIS Quarterly 35(2), xv-xvi.
-
(2011)
MIS Quarterly
, vol.35
, Issue.2
-
-
Stafford, T.1
-
60
-
-
17844366573
-
Analysis of end user security behaviors
-
STANTON J, STAM K, MASTRANGELO P and JOLTON J (2005) Analysis of end user security behaviors. Computers and Security 24(2), 124-133.
-
(2005)
Computers and Security
, vol.24
, Issue.2
, pp. 124-133
-
-
Stanton, J.1
Stam, K.2
Mastrangelo, P.3
Jolton, J.4
-
62
-
-
55249123249
-
Validating instruments in MIS research
-
STRAUB DW (1989) Validating instruments in MIS research. MIS Quarterly 13(2), 147-169.
-
(1989)
MIS Quarterly
, vol.13
, Issue.2
, pp. 147-169
-
-
Straub, D.W.1
-
63
-
-
0000280419
-
Effective IS security: An empirical study
-
STRAUB DW (1990) Effective IS security: an empirical study. Information Systems Research 1(3), 255-276.
-
(1990)
Information Systems Research
, vol.1
, Issue.3
, pp. 255-276
-
-
Straub, D.W.1
-
64
-
-
80052098308
-
Rigor and relevance in IS research: Redefining the debate and a call for future research
-
STRAUB DW and ANG S (2011) Rigor and relevance in IS research: redefining the debate and a call for future research. MIS Quarterly 35(1), iii-xi.
-
(2011)
MIS Quarterly
, vol.35
, Issue.1
-
-
Straub, D.W.1
Ang, S.2
-
66
-
-
77956374558
-
Discarding the 'basic science/applied science' dichotomy: A knowledge utilization triangle classification system of research journals
-
TIJSSEN R (2010) Discarding the 'basic science/applied science' dichotomy: a knowledge utilization triangle classification system of research journals. Journal of the American Society for Information Science and Technology 61(9), 1842-1852.
-
(2010)
Journal of the American Society for Information Science and Technology
, vol.61
, Issue.9
, pp. 1842-1852
-
-
Tijssen, R.1
-
67
-
-
0001936184
-
Experimental approaches to studying ethicalunethical behavior in organizations
-
TREVINO LK (1992) Experimental approaches to studying ethicalunethical behavior in organizations. Business Ethics Quarterly 2(2), 121-136.
-
(1992)
Business Ethics Quarterly
, vol.2
, Issue.2
, pp. 121-136
-
-
Trevino, L.K.1
-
68
-
-
21744439352
-
Limitations of the common European framework for developing comparable examinations and tests
-
WEIR C (2005) Limitations of the common European framework for developing comparable examinations and tests. Language Testing 22(3), 281-300.
-
(2005)
Language Testing
, vol.22
, Issue.3
, pp. 281-300
-
-
Weir, C.1
-
69
-
-
84873974226
-
Beyond deterrence: An expanded view of employee computer abuse
-
forthcoming
-
WILLISON R and WARKENTIN M (2013) Beyond deterrence: an expanded view of employee computer abuse. MIS Quarterly 37(1), forthcoming.
-
(2013)
MIS Quarterly
, vol.37
, Issue.1
-
-
Willison, R.1
Warkentin, M.2
|