Advanced search

Authors whose works are in public domain in at least one jurisdiction

List of works by Merrill Warkentin

A Framework for Evaluating Outsourcing Risk

scientific article

A Self‐Tuning Model for Smart Manufacturing SMEs: Effects on Digital Innovation

A Synthesis and Analysis of Behavioral and Policy Issues in Electronic Marketing Communications

scientific article

A TAM Analysis of an Alternative High-Security User Authentication Procedure

scientific article

A dual privacy decision model for online social networks

scientific article

A framework for spyware assessment

scientific article

A knowledge-based expert system for planning and design of agroforestry systems

scientific article

An Empirical Assessment of Technology Adoption as a Choice between Alternatives

scientific article

An imposed etic approach with Schwartz polar dimensions to explore cross-cultural use of social network services

Apps within apps: predicting government WeChat mini-program adoption from trust–risk perspective and innovation diffusion theory

article by Zhenya Tang et al published 11 June 2021 in Information Technology and People

Behavioral and policy issues in information systems security: the insider threat

scientific article

Can financial incentives help with the struggle for security policy compliance?

article by Sanjay Goel et al published June 2021 in Information & Management

Consumers' Preferences and Attitudes Toward Mobile Office Use

scientific article

Continuance of protective security behavior: A longitudinal study

scientific article

Cross-cultural IS research: perspectives from Eastern and Western traditions

scientific article

Culture and Trust in the Adoption of Electronic Voting

scientific article

Dispositional and situational factors: influences on information security policy violations

scientific article

Do I really belong?: Impact of employment status on information security policy compliance

scientific article

Don't make excuses! Discouraging neutralization to reduce IT policy violation

scientific article

Examining employee computer abuse intentions: insights from justice, deterrence and neutralization perspectives

scientific article

Examining the moderating role of sense of membership in online review evaluations

scientific article

Expert systems in laboratory medicine and pathology

scientific article

Exploring the Effects of the Privacy-Handling Management Styles of Social Networking Sites on User Satisfaction: A Conflict Management Perspective

scientific article

Exploring the impact of instant messaging on subjective task complexity and user satisfaction

scientific article

Exposing others’ information on online social networks (OSNs): Perceived shared risk, its determinants, and its influence on OSN privacy control use

scientific article

Future directions for behavioral information security research

article

Gender deception in asynchronous online communication: A path analysis

Herd behavior in information security decision-making

How do you feel about your friends? Understanding situational envy in online social networks

scientific article

IT Security Governance and Centralized Security Controls

scientific article

Implications of Monitoring Mechanisms on Bring Your Own Device Adoption

scientific article

Individual transportation decisions under conditions of risk and uncertainty

scientific article

Information privacy compliance in the healthcare industry

scientific article

Integrating Cognition with an Affective Lens to Better Understand Information Security Policy Compliance

Introduction to Innovative Behavioral IS Security and Privacy Research Minitrack

scientific article

Introduction to the Innovative Behavioral IS Security and Privacy Research Minitrack

scientific article

Introduction to the Minitrack on Innovative Behavioral IS Security and Privacy Research

scientific article

Is the responsibilization of the cyber security risk reasonable and judicious?

scholarly article by Karen Renaud published in September 2018

Leader’s dilemma game: An experimental design for cyber insider threat research

scientific article

Managers’ and Employees’ Differing Responses to Security Approaches

Personality, attitudes, and intentions: Predicting initial adoption of information security behavior

scientific article

Reactions to Abusive Supervision: Neutralization and IS Misuse

Self-efficacy in Information Security: A Replication Study

scientific article published in 2021

So many ways for assessing outliers: What really works and does it matter?

Speak their Language: Designing Effective Messages to Improve Employees’ Information Security Decision Making

scientific article

Steganography

scientific article

Steganography and Steganalysis

scientific article

Steganography and Steganalysis

Tablet Adoption with Smart School Website Technology

scientific article

The Effect of Belongingness on Obsessive-Compulsive Disorder in the Use of Online Social Networks

The impact of collectivism and psychological ownership on protection motivation: A cross-cultural examination

scientific article

The influence of the informal social learning environment on information privacy policy compliance efficacy and intention

scientific article

The interpersonal privacy identity (IPI): development of a privacy as control model

scientific article

The role of intelligent agents and data mining in electronic partnership management

scientific article

Two decades of the Journal of Intellectual Capital: a bibliometric overview and an agenda for future research

article by Marina Dabić et al published 14 December 2020 in Journal of Intellectual Capital

“This is the way ‘I’ create my passwords” ... does the endowment effect deter people from changing the way they create their passwords?