default search action
Merrill Warkentin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j97]Alaa Nehme, Meng (Leah) Li, Merrill Warkentin:
Adaptive and maladaptive factors behind password manager use: A hope-extended protection motivation perspective. Comput. Secur. 144: 103941 (2024) - [j96]Karen Renaud, Merrill Warkentin, Ganna Pogrebna, Karl van der Schyff:
VISTA: An inclusive insider threat taxonomy, with mitigation strategies. Inf. Manag. 61(1): 103877 (2024) - [j95]Ali Vedadi, Merrill Warkentin, Detmar W. Straub, Jordan Shropshire:
Fostering information security compliance as organizational citizenship behavior. Inf. Manag. 61(5): 103968 (2024) - [j94]Majid Mohammad Shafiee, Merrill Warkentin, Setare Motamed:
Do human capital and relational capital influence knowledge-intensive firm competitiveness? The roles of export orientation and marketing knowledge capability. J. Knowl. Manag. 28(1): 138-160 (2024) - [c42]Yuxiang Hong, Da Wang, Majid Mohammad Shafiee, Merrill Warkentin:
Formation of Cybersecurity Awareness: A Positive Psychological Perspective. AMCIS 2024 - [c41]Kyungmyung Jang, Merrill Warkentin:
The Role of Blockchain Technology Adoption on Data Breaches. AMCIS 2024 - [c40]Zhao Liu, Merrill Warkentin, Jutong Wen, Xinwei Liu:
Humanizing AI Customer Service: Want to Switch to Human Agents? AMCIS 2024 - [c39]Anthony Vance, Karen Renaud, Allen C. Johnston, Merrill Warkentin:
Introduction to the Minitrack on Innovative Behavioral IS Security and Privacy Research. HICSS 2024: 4712-4713 - [c38]Alper Yayla, Merrill Warkentin, Ersin Dincelli:
Introduction to the Minitrack on The Dark and Bright Sides of the Metaverse. HICSS 2024: 4899-4900 - 2023
- [j93]Allen C. Johnston, Paul Michael Di Gangi, France Bélanger, Robert E. Crossler, Mikko T. Siponen, Merrill Warkentin, Tripti Singh:
Seeking rhetorical validity in fear appeal research: An application of rhetorical theory. Comput. Secur. 125: 103020 (2023) - [j92]Edwin Donald Frauenstein, Stephen Flowerday, Syden Mishi, Merrill Warkentin:
Unraveling the behavioral influence of social media on phishing susceptibility: A Personality-Habit-Information Processing model. Inf. Manag. 60(7): 103858 (2023) - [j91]Ashraf Mady, Saurabh Gupta, Merrill Warkentin:
The effects of knowledge mechanisms on employees' information security threat construal. Inf. Syst. J. 33(4): 790-841 (2023) - [j90]Adéle da Veiga, Steven Furnell, Yuxiang Hong, Merrill Warkentin:
Introduction to the special issue on insider threats in cybersecurity. J. Inf. Secur. Appl. 79: 103585 (2023) - [j89]Botong Xue, Merrill Warkentin, Leigh A. Mutchler, Puzant Balozian:
Self-efficacy in Information Security: A Replication Study. J. Comput. Inf. Syst. 63(1): 1-10 (2023) - [c37]Anthony Vance, Merrill Warkentin, Allen C. Johnston:
Introduction to the Minitrack on Innovative Behavioral IS Security and Privacy Research. HICSS 2023: 4119-4120 - 2022
- [j88]Varol O. Kayhan, Merrill Warkentin:
Seeking Information Using Search Engines: The Impact of Negation on Judgments. Commun. Assoc. Inf. Syst. 52: 5 (2022) - [j87]Zhenya Tang, Zhongyun Zhou, Merrill Warkentin:
A contextualized comprehensive action determination model for predicting consumer electronics recommerce platform usage: A sequential mixed-methods approach. Inf. Manag. 59(3): 103617 (2022) - [j86]Zhenya Tang, Zhongyun Zhou, Feng Xu, Merrill Warkentin:
Apps within apps: predicting government WeChat mini-program adoption from trust-risk perspective and innovation diffusion theory. Inf. Technol. People 35(3): 1170-1190 (2022) - [j85]Feng Xu, Carol Hsu, Xin (Robert) Luo, Merrill Warkentin:
Reactions to Abusive Supervision: Neutralization and IS Misuse. J. Comput. Inf. Syst. 62(3): 632-641 (2022) - [j84]Tao Eric Hu, Zhenya Tang, Merrill Warkentin, Na Wen:
SLSS Gamification as an E-Commerce Model in China. J. Comput. Inf. Syst. 62(5): 921-939 (2022) - [j83]Zhenya Tang, Andrew Miller, Zhongyun Zhou, Merrill Warkentin:
Understanding Rumor Combating Behavior on Social Media. J. Comput. Inf. Syst. 62(6): 1112-1124 (2022) - [c36]Alaa Nehme, Merrill Warkentin, Kyungmyung Jang, Sumin Kim:
Beyond Rational Information Security Decisions: An Alternate View. AMCIS 2022 - [c35]Merrill Warkentin, Allen C. Johnston, Anthony Vance:
Introduction to the Minitrack on Innovative Behavioral IS Security and Privacy Research. HICSS 2022: 1 - [c34]Yimer Mohammed Hussien, Merrill Warkentin, Tibebe Beshah:
Understanding the Effects of RationalityBased Theories on Employees' Deviant Use of IS Resources: A Cross Cultural Examination. PACIS 2022: 57 - 2021
- [j82]Gaurav Bansal, Merrill Warkentin:
Do You Still Trust?: The Role of Age, Gender, and Privacy Concern on Trust after Insider Data Breaches. Data Base 52(4): 9-44 (2021) - [j81]Zhenya Tang, Andrew Miller, Zhongyun Zhou, Merrill Warkentin:
Does government social media promote users' information security behavior towards COVID-19 scams? Cultivation effects and protective motivations. Gov. Inf. Q. 38(2): 101572 (2021) - [j80]Sanjay Goel, Kevin J. Williams, Jingyi Huang, Merrill Warkentin:
Can financial incentives help with the struggle for security policy compliance? Inf. Manag. 58(4): 103447 (2021) - [j79]Ali Vedadi, Merrill Warkentin, Alan R. Dennis:
Herd behavior in information security decision-making. Inf. Manag. 58(8): 103526 (2021) - [j78]Brad S. Trinkle, Merrill Warkentin, Kalana Malimage, Nirmalee I. Raddatz:
High-Risk Deviant Decisions: Does Neutralization Still Play a Role? J. Assoc. Inf. Syst. 22(3): 3 (2021) - [c33]Shan Xiao, Merrill Warkentin:
Too Bored to Engage: An Exploratory Study of Information Security-related Boredom. AMCIS 2021 - [c32]Robert E. Crossler, France Bélanger, Carlos Torres, Allen C. Johnston, Merrill Warkentin:
Understanding Unstable Information Systems Phenomena: A Punctuated Equilibrium Perspective. HICSS 2021: 1-10 - [c31]Merrill Warkentin, Allen C. Johnston, Anthony Vance:
Introduction to the Minitrack on Innovative Behavioral IS Security and Privacy Research. HICSS 2021: 1 - [p3]Steven Furnell, Paul S. Haskell-Dowland, Manish Agrawal, Richard L. Baskerville, Anirban Basu, Matt Bishop, Jorge Cuéllar, Sara Foresti, Lynn Futcher, Nurit Gal-Oz, Tejaswini (Teju) Herath, Christian Damsgaard Jensen, Allen C. Johnston, Wouter Joosen, Giovanni Livraga, Javier López, Stephen Marsh, Fabio Martinelli, Fabio Massacci, Aljosa Pasic, Stef Schinagl, Abbas Shahim, Kerry-Lynn Thomson, Jaideep Vaidya, Tony Vance, Merrill Warkentin:
Information Security and Privacy - Challenges and Outlook. IFIP's Exciting First 60+ Years 2021: 383-401 - 2020
- [j77]Feng Xu, Merrill Warkentin:
Integrating elaboration likelihood model and herd theory in information security message persuasiveness. Comput. Secur. 98: 102009 (2020) - [j76]Chengqi (John) Guo, Merrill Warkentin, Xin (Robert) Luo, Anil Gurung, J. P. Shim:
An imposed etic approach with Schwartz polar dimensions to explore cross-cultural use of social network services. Inf. Manag. 57(8): 103261 (2020) - [j75]Merrill Warkentin, Craig P. Orgeron:
Using the security triad to assess blockchain technology in public sector applications. Int. J. Inf. Manag. 52: 102090 (2020) - [j74]Ali Vedadi, Merrill Warkentin:
Can Secure Behaviors Be Contagious? A Two-Stage Investigation of the Influence of Herd Behavior on Security Decisions. J. Assoc. Inf. Syst. 21(2): 3 (2020) - [j73]Leigh A. Mutchler, Merrill Warkentin:
Experience Matters: The Role of Vicarious Experience in Secure Actions. J. Database Manag. 31(2): 1-20 (2020) - [j72]Nirmalee I. Raddatz, Thomas F. Stafford, Craig Van Slyke, Merrill Warkentin:
Grassroots Adoption of Cloud-Based Storage Solutions. J. Inf. Syst. 34(3): 213-232 (2020) - [c30]Pardon Blessings Maoneke, Stephen V. Flowerday, Merrill Warkentin:
Evaluating the Usability of a Multilingual Passphrase Policy. AMCIS 2020 - [c29]Feng Xu, Botong Xue, Merrill Warkentin:
How do Leader Emotional Displays Influence Employees' Information Security Effort? AMCIS 2020 - [c28]Sanjay Goel, Kevin J. Williams, Jingyi Huang, Merrill Warkentin:
Understanding the Role of Incentives in Security Behavior. HICSS 2020: 1-6 - [c27]Allen C. Johnston, Merrill Warkentin, Anthony Vance:
Introduction to the Minitrack on Innovative Behavioral IS Security and Privacy Research. HICSS 2020: 1
2010 – 2019
- 2019
- [j71]Davide C. Orazi, Merrill Warkentin, Allen C. Johnston:
Integrating Construal-level Theory in Designing Fear Appeals in IS Security Research. Commun. Assoc. Inf. Syst. 45: 22 (2019) - [j70]Karen Renaud, Robert F. Otondo, Merrill Warkentin:
"This is the way 'I' create my passwords" ... does the endowment effect deter people from changing the way they create their passwords? Comput. Secur. 82: 241-260 (2019) - [j69]Shwadhin Sharma, Merrill Warkentin:
Do I really belong?: Impact of employment status on information security policy compliance. Comput. Secur. 87 (2019) - [j68]Allen C. Johnston, Merrill Warkentin, Alan R. Dennis, Mikko T. Siponen:
Speak their Language: Designing Effective Messages to Improve Employees' Information Security Decision Making. Decis. Sci. 50(2): 245-284 (2019) - [j67]Zhenya Tang, Leida Chen, Zhongyun Zhou, Merrill Warkentin, Mark Lee Gillenson:
The effects of social media use on control of corruption and moderating role of cultural tightness-looseness. Gov. Inf. Q. 36(4) (2019) - [j66]Jeffrey D. Wall, Merrill Warkentin:
Perceived argument quality's effect on threat and coping appraisals in fear appeals: An experiment and exploration of realism check heuristics. Inf. Manag. 56(8) (2019) - [j65]Dustin Ormond, Merrill Warkentin, Robert E. Crossler:
Integrating Cognition with an Affective Lens to Better Understand Information Security Policy Compliance. J. Assoc. Inf. Syst. 20(12): 4 (2019) - [j64]Puzant Balozian, Dorothy E. Leidner, Merrill Warkentin:
Managers' and Employees' Differing Responses to Security Approaches. J. Comput. Inf. Syst. 59(3): 197-210 (2019) - [c26]Merrill Warkentin, Allen C. Johnston, Anthony Vance:
Introduction to the Minitrack on Innovative Behavioral IS Security and Privacy Research. HICSS 2019: 1 - 2018
- [j63]Robert F. Otondo, Robert E. Crossler, Merrill Warkentin:
Ranking Factors by Importance in Factorial Survey Analysis. Commun. Assoc. Inf. Syst. 42: 8 (2018) - [j62]Robert E. Crossler, Paul Michael Di Gangi, Allen C. Johnston, France Bélanger, Merrill Warkentin:
Providing Theoretical Foundations: Developing an Integrated Set of Guidelines for Theory Adaptation. Commun. Assoc. Inf. Syst. 43: 31 (2018) - [j61]Philip Menard, Merrill Warkentin, Paul Benjamin Lowry:
The impact of collectivism and psychological ownership on protection motivation: A cross-cultural examination. Comput. Secur. 75: 147-166 (2018) - [j60]Karen Renaud, Stephen Flowerday, Merrill Warkentin, Paul Cockshott, Craig P. Orgeron:
Is the responsibilization of the cyber security risk reasonable and judicious? Comput. Secur. 78: 198-211 (2018) - [j59]Ali Vedadi, Merrill Warkentin:
Secure Behavior over Time: Perspectives from the Theory of Process Memory. Data Base 49(SI): 39-48 (2018) - [j58]Merrill Warkentin, Shwadhin Sharma, David Gefen, Gregory M. Rose, Paul A. Pavlou:
Social identity and trust in internet-based voting adoption. Gov. Inf. Q. 35(2): 195-209 (2018) - [j57]Robert Willison, Merrill Warkentin, Allen C. Johnston:
Examining employee computer abuse intentions: insights from justice, deterrence and neutralization perspectives. Inf. Syst. J. 28(2): 266-293 (2018) - [j56]Jordan B. Barlow, Merrill Warkentin, Dustin Ormond, Alan R. Dennis:
Don't Even Think About It! The Effects of Antineutralization, Informational, and Normative Communication on Information Security Compliance. J. Assoc. Inf. Syst. 19(8): 3 (2018) - [c25]Andrew Miller, Merrill Warkentin:
Why Lie?: Deception of Health Information. AMCIS 2018 - [c24]Merrill Warkentin, Sanjay Goel, Kevin J. Williams, Karen Renaud:
Are we Predisposed to Behave Securely? Influence of Risk Disposition on Individual Security Behaviours. ECIS 2018: 25 - [c23]Linda G. Wallace, Merrill Warkentin, Izak Benbasat:
How Do You Handle It? An Investigation of Facebook Affordances and Envy. HICSS 2018: 1-10 - [c22]Merrill Warkentin, Allen C. Johnston, Anthony Vance:
Introduction to the Minitrack on Innovative Behavioral IS Security and Privacy Research. HICSS 2018: 1 - [c21]Ali Vedadi, Merrill Warkentin:
Sustained Secure Behavior and the Role of Self-Efficacy. ICIS 2018 - 2017
- [j55]Jie Zhang, Han Li, Xin (Robert) Luo, Merrill Warkentin:
Exploring the Effects of the Privacy-Handling Management Styles of Social Networking Sites on User Satisfaction: A Conflict Management Perspective. Decis. Sci. 48(5): 956-989 (2017) - [j54]Linda G. Wallace, Tabitha L. James, Merrill Warkentin:
How do you feel about your friends? Understanding situational envy in online social networks. Inf. Manag. 54(5): 669-682 (2017) - [j53]Tabitha L. James, Linda G. Wallace, Merrill Warkentin, Byung Cho Kim, Stéphane E. Collignon:
Exposing others' information on online social networks (OSNs): Perceived shared risk, its determinants, and its influence on OSN privacy control use. Inf. Manag. 54(7): 851-865 (2017) - [j52]Shuyuan Mary Ho, Paul Benjamin Lowry, Merrill Warkentin, Yanyun Yang, Jonathan M. Hollister:
Gender deception in asynchronous online communication: A path analysis. Inf. Process. Manag. 53(1): 21-41 (2017) - [j51]Shuyuan Mary Ho, Merrill Warkentin:
Leader's dilemma game: An experimental design for cyber insider threat research. Inf. Syst. Frontiers 19(2): 377-396 (2017) - [j50]Merrill Warkentin, Sanjay Goel, Philip Menard:
Shared Benefits and Information Privacy: What Determines Smart Meter Technology Adoption? J. Assoc. Inf. Syst. 18(11): 3 (2017) - [j49]James Lee, Merrill Warkentin, Robert E. Crossler, Robert F. Otondo:
Implications of Monitoring Mechanisms on Bring Your Own Device Adoption. J. Comput. Inf. Syst. 57(4): 309-318 (2017) - [j48]Tabitha L. James, Paul Benjamin Lowry, Linda G. Wallace, Merrill Warkentin:
The Effect of Belongingness on Obsessive-Compulsive Disorder in the Use of Online Social Networks. J. Manag. Inf. Syst. 34(2): 560-596 (2017) - [c20]Ersin Dincelli, Sanjay Goel, Merrill Warkentin:
Understanding Nuances of Privacy and Security in the Context of Information Systems. AMCIS 2017 - [c19]Ali Vedadi, Merrill Warkentin:
Developing Measurement Scales for Passwords Uniqueness and Secrecy. AMCIS 2017 - [c18]Merrill Warkentin, Allen C. Johnston, Anthony Vance:
Introduction to Innovative Behavioral IS Security and Privacy Research Minitrack. HICSS 2017: 1 - [c17]Karen Renaud, Merrill Warkentin:
Risk Homeostasis in Information Security: Challenges in Confirming Existence and Verifying Impact. NSPW 2017: 57-69 - 2016
- [j47]Ali Vedadi, Merrill Warkentin:
Continuance Intention on Using Mobile Banking Applications: A Replication Study of Information Systems Continuance Model. AIS Trans. Replication Res. 2: 7 (2016) - [j46]James Lee, Merrill Warkentin, Allen C. Johnston:
A Broader View of Perceived Risk during Internet Transactions. Commun. Assoc. Inf. Syst. 38: 8 (2016) - [j45]Merrill Warkentin, Allen C. Johnston, Jordan Shropshire, William D. Barnett:
Continuance of protective security behavior: A longitudinal study. Decis. Support Syst. 92: 25-35 (2016) - [j44]Allen C. Johnston, Merrill Warkentin, Maranda E. McBride, Lemuria D. Carter:
Dispositional and situational factors: influences on information security policy violations. Eur. J. Inf. Syst. 25(3): 231-251 (2016) - [j43]Tabitha L. James, Quinton Nottingham, Stéphane E. Collignon, Merrill Warkentin, Jennifer L. Ziegelmayer:
The interpersonal privacy identity (IPI): development of a privacy as control model. Inf. Technol. Manag. 17(4): 341-360 (2016) - [j42]Merrill Warkentin, Eric A. Walden, Allen C. Johnston, Detmar W. Straub:
Neural Correlates of Protection Motivation for Secure IT Behaviors: An fMRI Examination. J. Assoc. Inf. Syst. 17(3): 1 (2016) - [j41]Iris Reychav, Merrill Warkentin, Martin J. Ndicu:
Tablet Adoption with Smart School Website Technology. J. Comput. Inf. Syst. 56(4): 280-287 (2016) - [c16]Merrill Warkentin, Anthony Vance, Allen C. Johnston:
Introduction to the Minitrack on Innovative Behavioral IS Security and Privacy Research. HICSS 2016: 3635 - 2015
- [j40]Jordan Shropshire, Merrill Warkentin, Shwadhin Sharma:
Personality, attitudes, and intentions: Predicting initial adoption of information security behavior. Comput. Secur. 49: 177-191 (2015) - [j39]Merrill Warkentin, Brigitte Charles-Pauvers, Patrick Y. K. Chau:
Cross-cultural IS research: perspectives from Eastern and Western traditions. Eur. J. Inf. Syst. 24(3): 229-233 (2015) - [j38]Chuan Luo, Xin (Robert) Luo, Yun Xu, Merrill Warkentin, Choon-Ling Sia:
Examining the moderating role of sense of membership in online review evaluations. Inf. Manag. 52(3): 305-316 (2015) - [j37]Tabitha L. James, Merrill Warkentin, Stéphane E. Collignon:
A dual privacy decision model for online social networks. Inf. Manag. 52(8): 893-908 (2015) - [j36]Dustin Ormond, Merrill Warkentin:
Is this a Joke? The Impact of Message Manipulations on Risk Perceptions. J. Comput. Inf. Syst. 55(2): 9-19 (2015) - [j35]Roger McHaney, Merrill Warkentin, David A. Sachs, Michael Brian Pope, Dustin Ormond:
Teaching Social Media in Business. J. Inf. Technol. Educ. Innov. Pract. 14: 39-62 (2015) - [j34]Allen C. Johnston, Merrill Warkentin, Mikko T. Siponen:
An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to the Human Asset Through Sanctioning Rhetoric. MIS Q. 39(1): 113-134 (2015) - [c15]Merrill Warkentin, Allen C. Johnston, Anthony Vance:
Introduction to the Innovative Behavioral IS Security and Privacy Research Minitrack. HICSS 2015: 3452 - 2014
- [j33]Philip Menard, Robert Gatlin, Merrill Warkentin:
Threat Protection and Convenience: Antecedents of Cloud-Based Data Backup. J. Comput. Inf. Syst. 55(1): 83-91 (2014) - [j32]Brad S. Trinkle, Robert E. Crossler, Merrill Warkentin:
I'm Game, are You? Reducing Real-World Security Threats by Managing Employee Activity in Online Social Networks. J. Inf. Syst. 28(2): 307-327 (2014) - [c14]Merrill Warkentin, Allen C. Johnston, Anthony Vance:
Introduction to Innovative Behavioral IS Security and Privacy Research Minitrack. HICSS 2014: 3148 - [p2]Merrill Warkentin, Leigh A. Mutchler:
Behavioral Information Security Management. Computing Handbook, 3rd ed. (2) 2014: 54: 1-20 - 2013
- [j31]Robert E. Crossler, Allen C. Johnston, Paul Benjamin Lowry, Qing Hu, Merrill Warkentin, Richard L. Baskerville:
Future directions for behavioral information security research. Comput. Secur. 32: 90-101 (2013) - [j30]Jordan B. Barlow, Merrill Warkentin, Dustin Ormond, Alan R. Dennis:
Don't make excuses! Discouraging neutralization to reduce IT policy violation. Comput. Secur. 39: 145-159 (2013) - [j29]Xin (Robert) Luo, Merrill Warkentin, Han Li:
Understanding Technology Adoption Trade-Offs: A Conjoint Analysis Approach. J. Comput. Inf. Syst. 53(3): 65-74 (2013) - [j28]Robert Willison, Merrill Warkentin:
Beyond Deterrence: An Expanded View of Employee Computer Abuse. MIS Q. 37(1): 1-20 (2013) - [c13]James Lee, Robert E. Crossler, Merrill Warkentin:
Implications of Monitoring Mechanisms on Bring Your Own Device (BYOD) Adoption. ICIS 2013 - 2012
- [j27]Michael Brian Pope, Merrill Warkentin, Leigh A. Mutchler, Xin (Robert) Luo:
The Domain Name System - Past, Present, and Future. Commun. Assoc. Inf. Syst. 30: 21 (2012) - [j26]Michael Brian Pope, Merrill Warkentin, Ernst Bekkering, Mark B. Schmidt:
Digital Steganography - An Introduction to Techniques and Tools. Commun. Assoc. Inf. Syst. 30: 22 (2012) - [j25]Merrill Warkentin, Vijayan Sugumaran, Robert Sainsbury:
The role of intelligent agents and data mining in electronic partnership management. Expert Syst. Appl. 39(18): 13277-13288 (2012) - [j24]Michael Brian Pope, Merrill Warkentin, Xin (Robert) Luo:
Evolutionary Malware: Mobile Malware, Botnets, and Malware Toolkits. Int. J. Wirel. Networks Broadband Technol. 2(3): 52-60 (2012) - [c12]Merrill Warkentin, Nirmalee Malimage:
Overcoming Mixed-Gender Requirements Misspecification with the Modified Coherence Method. AMCIS 2012 - [c11]Merrill Warkentin, Maranda E. McBride, Lemuria D. Carter, Allen C. Johnston:
The Role of Individual Characteristics on Insider Abuse Intentions. AMCIS 2012 - [c10]Merrill Warkentin, Shwadhin Sharma, David Gefen, Paul A. Pavlou, Gregory M. Rose:
Government of the People, By the People: A Look at Trust in eGovernment. AMCIS 2012 - 2011
- [j23]Han Li, Ashish Gupta, Xin (Robert) Luo, Merrill Warkentin:
Exploring the impact of instant messaging on subjective task complexity and user satisfaction. Eur. J. Inf. Syst. 20(2): 139-155 (2011) - [j22]Merrill Warkentin, Allen C. Johnston, Jordan Shropshire:
The influence of the informal social learning environment on information privacy policy compliance efficacy and intention. Eur. J. Inf. Syst. 20(3): 267-284 (2011) - [c9]Merrill Warkentin, Robert Willison, Allen C. Johnston:
The Role of Perceptions of Organizational Injustice and Techniques of Neutralization in Forming Computer Abuse Intentions. AMCIS 2011 - 2010
- [j21]Jordan Shropshire, Merrill Warkentin, Allen C. Johnston:
Impact of Negative Message Framing on Security Adoption. J. Comput. Inf. Syst.