325 results on '"Warkentin, Merrill"'
Search Results
2. Examining the effects of national intellectual capital on economic growth: does digital services trade restrictiveness matter?
3. Digital trading networks and competitive advantage in a buyer-seller network
4. Bridging information systems and marketing: Charting collaborative pathways
5. Give to give: The gifting motivation and behavior in the social live streaming service
6. Adaptive and maladaptive factors behind password manager use: A hope-extended protection motivation perspective
7. Do human capital and relational capital influence knowledge-intensive firm competitiveness? The roles of export orientation and marketing knowledge capability
8. Role of shared identity and agency trust in online voting among Finnish citizens
9. Editorial: Where the data meets the road in the Industry 4.0 economy
10. Seeking rhetorical validity in fear appeal research: An application of rhetorical theory
11. Apps within apps: predicting government WeChat mini-program adoption from trust–risk perspective and innovation diffusion theory
12. Information Security and Privacy – Challenges and Outlook
13. So many ways for assessing outliers: What really works and does it matter?
14. Two decades of the Journal of Intellectual Capital: a bibliometric overview and an agenda for future research
15. Guest editorial
16. Do We Protect What We Own?: A Proposed Neurophysiological Exploration of Workplace Information Protection Motivation
17. Integrating elaboration likelihood model and herd theory in information security message persuasiveness
18. Using the security triad to assess blockchain technology in public sector applications
19. The insider threat ‘zoo’
20. Fostering Information Security Compliance as Organizational Citizenship Behavior
21. Do I really belong?: Impact of employment status on information security policy compliance
22. “This is the way ‘I’ create my passwords” ... does the endowment effect deter people from changing the way they create their passwords?
23. VISTA: An inclusive insider threat taxonomy, with mitigation strategies
24. Understanding employees’ energy saving behavior from the perspective of stimulus-organism-responses
25. Persuasive Security Messages
26. Is the responsibilization of the cyber security risk reasonable and judicious?
27. The impact of collectivism and psychological ownership on protection motivation: A cross-cultural examination
28. Unraveling the behavioral influence of social media on phishing susceptibility: A Personality-Habit-Information Processing model
29. Do We Protect What We Own?: A Proposed Neurophysiological Exploration of Workplace Information Protection Motivation
30. A Knowledge-Based Expert System for Planning and Design of Agroforestry Systems
31. Knowledge Engineering: Creating Expert Systems for Crop Production Management in Egypt
32. Gender deception in asynchronous online communication: A path analysis
33. Individual transportation decisions under conditions of risk and uncertainty
34. Continuance of protective security behavior: A longitudinal study
35. The Effect of Belongingness on Obsessive-Compulsive Disorder in the Use of Online Social Networks
36. A Replication Study on Users' Congruence with Piracy Deterrence Messages.
37. Do human capital and relational capital influence knowledge-intensive firm competitiveness? The roles of export orientation and marketing knowledge capability
38. Personality, attitudes, and intentions: Predicting initial adoption of information security behavior
39. Teaching Social Media in Business
40. Leader’s dilemma game: An experimental design for cyber insider threat research
41. An Enhanced Fear Appeal Rhetorical Framework : Leveraging Threats to the Human Asset Through Sanctioning Rhetoric
42. The effects of knowledge mechanisms on employees' information security threat construal
43. Introduction to the Minitrack on Innovative Behavioral IS Security and Privacy Research
44. A Longitudinal Study of Information Exchange in Computer-Mediated and Face-to-Face Groups
45. The interpersonal privacy identity (IPI): development of a privacy as control model
46. Don't make excuses! Discouraging neutralization to reduce IT policy violation
47. Future directions for behavioral information security research
48. Beyond Deterrence: An Expanded View of Employee Computer Abuse
49. The role of intelligent agents and data mining in electronic partnership management
50. Fear Appeals and Information Security Behaviors: An Empirical Study
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.