![]() | FRANK, M.-L.* , POCHER, N.* , & THARWAT, A.*. (2026). The Influence of Institutional Trust on the Adoption of the Digital Euro. In Proceedings of 59th Hawaii International Conference on System Sciences (HICSS) (pp. 2206-2215). United States - Hawaii: University of Hawaii at Manoa. Peer reviewed* These authors have contributed equally to this work. |
![]() | ASYALI, A. N.* , THARWAT, A.* , FRANK, M.-L., & Jaeger, L. (06 January 2026). Going the ‘Extra’ Mile: The Role of Sensemaking in Extra-Role Security Behaviors [Paper presentation]. Proceedings of the 59th Hawaii International Conference on System Sciences, Maui, Hawaii, United States. Peer reviewed* These authors have contributed equally to this work. |
![]() | HÖLZMER, P.* , FRANK, M.-L., SCHÖNRICH-SEDLMEIR, J., & Manuel Koschuch. (07 January 2025). Insights into Digital Identity Dynamics through Personal Digital Twins [Paper presentation]. Proceedings of the 58th Hawaii International Conference on System Sciences (HICSS), Big Island, USA. doi:10.24251/HICSS.2025.876 Peer reviewed |
![]() | FRANK, M.-L.* , BRENNECKE, M., HÖLZMER, P., POCHER, N., & FRIDGEN, G. (07 January 2025). Potential of AI for User-Centric Cybersecurity in the Financial Sector [Paper presentation]. Proceedings of the 58th Hawaii International Conference on System Sciences (HICSS), Big Island, United States - Hawaii. doi:10.24251/HICSS.2025.543 Peer reviewed |
![]() | FRANK, M.-L., THARWAT, A., & POCHER, N. (2025). Far Enough to Share: Impact of Psychological Distance on GenAI Disclosure [Paper presentation]. Proceedings of the 31st Americas Conference on Information Systems (AMCIS), Montreal, Canada. Peer reviewed |
![]() | AKKOUCH, R., THARWAT, A., FRANK, M.-L., FRIDGEN, G., & Keller, R. (2025). 2nd European Symposium on Information Systems Engineering (ESISE) [Paper presentation]. 2nd European Symposium on Information Systems Engineering (ESISE), Clervaux, Luxembourg. Peer reviewed |
![]() | FRANK, M.-L., Kohn, V., & Holten, R. (2024). Q methodology and the sociotechnical perspective. Information Systems and e-Business Management. doi:10.1007/s10257-024-00679-x Peer Reviewed verified by ORBi |
![]() | Bilousova, M., & FRANK, M.-L. (03 May 2024). Understanding Vehicle-to-Grid User Engagement Using Self-Determination Theory [Paper presentation]. 32nd European Conference on Information Systems (ECIS), Paphos, Cyprus. Peer reviewed |
![]() | FRANK, M.-L., Wacker, M., & Ranft, L. M. (03 January 2024). Same or Not the Same? Comparison Between Employees Prone to Overplacement, Overestimation, and Overprecision in Information Security [Paper presentation]. Proceedings of the 57th Hawaii International Conference on System Sciences, Honolulu, United States - Hawaii. Peer reviewed |
![]() | ANDOLFI, L., MARXEN, H., & FRANK, M.-L. (2024). Are You Flexible Enough? The Impact of Energy Literacy and Environmental Values on Flexibility Provision. In Are You Flexible Enough? The Impact of Energy Literacy and Environmental Values on Flexibility Provision. 2024 20th International Conference on the European Energy Market (EEM). doi:10.1109/EEM60825.2024.10608859 Peer reviewed |
![]() | ABELLÁN ÁLVAREZ, I., Ehaus, M., FRANK, M.-L., & SCHÖNRICH-SEDLMEIR, J. (2024). Privacy-Enhancing Technologies. In Financial Innovation and Technology (pp. 97-119). Springer Nature Switzerland. doi:10.1007/978-3-031-66047-4_6 Editorial reviewed |
![]() | FRANK, M.-L., MARXEN, H., & FRIDGEN, G. (2024). The Role of Gender in Data Sharing for Smart Charging of Electric Vehicles [Paper presentation]. Proceedings of the Thirtieth Americas Conference on Information Systems. Peer reviewed |
![]() | Glöckler, J., SEDLMEIR, J., FRANK, M.-L., & FRIDGEN, G. (2023). A systematic review of identity and access management requirements in enterprises and potential contributions of self-sovereign identity. Business and Information Systems Engineering. doi:10.1007/s12599-023-00830-x Peer Reviewed verified by ORBi |
![]() | FRANK, M.-L., & Kohn, V. (2023). Understanding extra-role security behaviors: An integration of self-determination theory and construal level theory. Computers and Security, 132, 103386. doi:10.1016/j.cose.2023.103386 Peer Reviewed verified by ORBi |