default search action
Yair Levy
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c15]John McConnell, Yair Levy, Marti Snyder, Ling Wang:
The Role of Heuristics and Biases in Linux Server Administrators' Information Security Policy Compliance at Healthcare Organizations. ICISSP 2024: 30-41 - [c14]Jackie Scott, Yair Levy, Wei Li, Ajoy Kumar:
Comparing Phishing Training and Campaign Methods for Mitigating Malicious Emails in Organizations. ICISSP 2024: 643-651 - 2023
- [j26]Ruti Gafni, Yair Levy:
Experts' feedback on the cybersecurity footprint elements: in pursuit of a quantifiable measure of SMBs' cybersecurity posture. Inf. Comput. Secur. 31(5): 601-623 (2023) - 2022
- [j25]Linda Greene, Inkyoung Hur, Yair Levy, Ling Wang, Keumseok Kang:
Assessing Effects of Media Affordances and Information Security Awareness on Knowledge-Sharing in Global Software Development. J. Inf. Syst. 36(1): 111-132 (2022) - [c13]Ariel Luna, Yair Levy, Gregory Simco, Wei Li:
Proposed Empirical Assessment of Remote Workers' Cyberslacking and Computer Security Posture to Assess Organizational Cybersecurity Risks. HPEC 2022: 1-2 - 2021
- [j24]Yair Levy, Ruti Gafni:
Introducing the concept of cybersecurity footprint. Inf. Comput. Secur. 29(5): 724-736 (2021) - [j23]Saleh Hamed Alharthi, Yair Levy, Ling Wang, Inkyoung Hur:
Employees' Mobile Cyberslacking and Their Commitment to the Organization. J. Comput. Inf. Syst. 61(2): 141-153 (2021) - [j22]Carlene Blackwood-Brown, Yair Levy, John D'Arcy:
Cybersecurity Awareness and Skills of Senior Citizens: A Motivation Perspective. J. Comput. Inf. Syst. 61(3): 195-206 (2021)
2010 – 2019
- 2019
- [j21]Saleh Hamed Alharthi, Yair Levy, Mansour Awaji:
Empirical Testing of Resistance and Misuse Factors Contributing to Instructors' Use of E-Learning Systems in Saudi Arabia. AIS Trans. Replication Res. 5: 1 (2019) - [j20]Melissa Carlton, Yair Levy, Michelle M. Ramim:
Mitigating cyber attacks through the measurement of non-IT professionals' cybersecurity skills. Inf. Comput. Secur. 27(1): 101-121 (2019) - 2018
- [j19]Yair Levy:
Does the normative question about rationality rest on a mistake? Synth. 195(5): 2021-2038 (2018) - [c12]Iqbal Amiri, Ling Wang, Yair Levy, Inkyoung Hur:
An Empirical Study on the Factors Contributing to Disclosing Personal Information Online: Insecurity in the Digital Age. AMCIS 2018 - [c11]Keiona Davis, Yair Levy, Bostjan Delak:
Towards a Development of Cybersecurity Risk-Responsibility Taxonomy of Small Enterprises for Data Breach Risk Mitigation. AMCIS 2018 - [c10]Yair Levy, Herbert J. Mattord:
Final Report of the ACM/IEEE/AIS/IFIP Joint Task Force (JTF) on Cybersecurity Education. AMCIS 2018 - 2017
- [j18]Neelima Bhatnagar, Harold Madden, Yair Levy:
Initial Empirical Testing of Potential Factors Contributing to Patient Use of Secure Medical Teleconferencing. J. Comput. Inf. Syst. 57(1): 89-95 (2017) - [c9]Saleh Hamed Alharthi, Mansour Awaji, Yair Levy:
Empirical Assessment of the Factors that Influence Instructors' Usage of E-Learning Systems in Saudi Arabia. AMCIS 2017 - [c8]Matt Bishop, Diana L. Burley, Scott Buck, Joseph J. Ekstrom, Lynn Futcher, David S. Gibson, Elizabeth K. Hawthorne, Siddharth Kaza, Yair Levy, Herbert J. Mattord, Allen Parrish:
Cybersecurity Curricular Guidelines. World Conference on Information Security Education 2017: 3-13 - 2016
- [j17]Kenrie Hylton, Yair Levy, Laurie P. Dringus:
Utilizing webcam-based proctoring to deter misconduct in online exams. Comput. Educ. 92-93: 53-63 (2016) - [c7]Yair Levy:
The Joint Task Force on Cybersecurity Education. AMCIS 2016 - 2013
- [j16]Gary Mansi, Yair Levy:
Do instant messaging interruptions help or hinder knowledge workers' task performance? Int. J. Inf. Manag. 33(3): 591-596 (2013) - [j15]Herbert J. Mattord, Yair Levy, Steven Furnell:
An Expert Panel Approach on Developing a Unified System Authentication Benchmarking Index. Int. J. Interdiscip. Telecommun. Netw. 5(2): 32-42 (2013) - [j14]Yair Levy, Michelle M. Ramim, Raymond A. Hackney:
Assessing Ethical Severity of e-Learning Systems Security Attacks. J. Comput. Inf. Syst. 53(3): 75-84 (2013) - [c6]Herbert J. Mattord, Yair Levy, Steven Furnell:
Factors of Password-based Authentication. AMCIS 2013 - 2012
- [j13]Sara Hejazi, Yair Levy:
The Role of Responsibility Factors of Reducing Inefficiencies in IS Projects on Six Sigma Certification in Service Organizations. Int. J. Inf. Syst. Serv. Sect. 4(3): 1-28 (2012) - [c5]Ally Lee, Yair Levy, William Hafner:
The Effect of Information Quality on Trust in E-Government Systems. AMCIS 2012 - [c4]Bernard Lichvar, Yair Levy, Timothy J. Ellis:
Knowledge as an Intellectual Property: The Effect of Knowledge Sharing and Encouragement by Others on Information Systems Use in the Workplace. AMCIS 2012 - 2010
- [j12]Yair Levy, Theon L. Danet:
Implementation Success Model in Government Agencies: A Case of a Centralized Identification System at NASA. Int. J. Inf. Syst. Serv. Sect. 2(2): 19-32 (2010)
2000 – 2009
- 2009
- [j11]Anthony J. Nichols, Yair Levy:
Empirical assessment of college student-athletes' persistence in e-learning courses: A case study of a U.S. National Association of Intercollegiate Athletics (NAIA) institution. Internet High. Educ. 12(1): 14-25 (2009) - [j10]Yair Levy, Kenneth E. Murphy, Stelios H. Zanakis:
A Value-Satisfaction Taxonomy of IS Effectiveness (VSTISE): A Case Study of User Satisfaction with IS and User-Perceived Value of IS. Int. J. Inf. Syst. Serv. Sect. 1(1): 93-118 (2009) - [j9]Yair Levy, Bruce D. Green:
An Empirical Study of Computer Self-Efficacy and the Technology Acceptance Model in the Military: A Case of a U.S. Navy Combat Information System. J. Organ. End User Comput. 21(3): 1-23 (2009) - 2008
- [j8]Yair Levy:
An empirical development of critical value factors (CVF) of online learning activities: An application of activity theory and cognitive value theory. Comput. Educ. 51(4): 1664-1675 (2008) - [j7]Timothy J. Ellis, Yair Levy:
Framework of Problem-Based Research: A Guide for Novice Researchers on the Development of a Research-Worthy Problem. Informing Sci. Int. J. an Emerg. Transdiscipl. 11: 17-33 (2008) - [j6]Diane M. Ball, Yair Levy:
Emerging Educational Technology: Assessing the Factors that Influence Instructors' Acceptance in Information Systems and Other Classrooms. J. Inf. Syst. Educ. 19(4): 431-444 (2008) - 2007
- [j5]Yair Levy:
Comparing dropouts and persistence in e-learning courses. Comput. Educ. 48(2): 185-204 (2007) - 2006
- [j4]Yair Levy:
The Top 10 Most Valuable Online Learning Activities for Graduate MIS Students. Int. J. Inf. Commun. Technol. Educ. 2(3): 27-44 (2006) - [j3]Yair Levy, Timothy J. Ellis:
A Systems Approach to Conduct an Effective Literature Review in Support of Information Systems Research. Informing Sci. Int. J. an Emerg. Transdiscipl. 9: 181-212 (2006) - [j2]Michelle M. Ramim, Yair Levy:
Securing E-Learning Systems: A Case of Insider Cyber Attacks and Novice IT Management in a Small University. J. Cases Inf. Technol. 8(4): 24-34 (2006) - 2005
- [j1]Yair Levy:
A Case Study of Management Skills Comparison in Online and On-Campus MBA Programs. Int. J. Inf. Commun. Technol. Educ. 1(3): 1-20 (2005) - [r1]Yair Levy, Michelle M. Ramim:
Eight Key Elements of Successful Self-Funding E-Learning Programs. Encyclopedia of Information Science and Technology (II) 2005: 995-1000 - 2004
- [c3]Yair Levy:
Comparing dropouts and persistence in e-learning courses. Communications, Internet, and Information Technology 2004: 245-254 - 2002
- [c2]Yair Levy, Kenneth E. Murphy:
Toward a Value Framework for Online Learning Systems. HICSS 2002: 5 - 2001
- [c1]Yair Levy:
E-LEARNING: An Overview Of Next-Generation Internet Based Distance Learning Systems. WebNet 2001: 780-786
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint