default search action
W. Alec Cram
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j27]W. Alec Cram, John D'Arcy, Alexander Benlian:
Time Will Tell: The Case for an Idiographic Approach to Behavioral Cybersecurity Research. MIS Q. 48(1): 95-136 (2024) - [c21]W. Alec Cram, Ian McKillop:
Evaluating a Cybersecurity Operations Center Implementation Program in a Regional Healthcare System: Challenges and Lessons Learned. HICSS 2024: 3739-3748 - [c20]W. Alec Cram, Albert Chan, Jonathan Yuan, Dennis Joo:
Conceal or Communicate? Organizational Notifications to Stakeholders Following Ransomware Attacks. HICSS 2024: 4206-4215 - 2023
- [j26]Martin Wiener, W. Alec Cram, Ulrich Remus, Magnus Mähring:
Control-style choices and performance impacts: How should senior IS managers enact control over uncertain IS projects? Decis. Support Syst. 167: 113915 (2023) - [j25]Martin Wiener, W. Alec Cram, Alexander Benlian:
Algorithmic control and gig workers: a legitimacy perspective of Uber drivers. Eur. J. Inf. Syst. 32(3): 485-507 (2023) - [j24]W. Alec Cram, John D'Arcy:
'What a waste of time': An examination of cybersecurity legitimacy. Inf. Syst. J. 33(6): 1396-1422 (2023) - [j23]Jeffrey Gainer Proudfoot, W. Alec Cram, Stuart E. Madnick, Michael Coden:
The Importance of Board Member Actions for Cybersecurity Governance and Risk Management. MIS Q. Executive 22(4): 6 (2023) - [c19]Armin Alizadeh, Felix Hirsch, Alexander Benlian, Martin Wiener, W. Alec Cram:
Perceived Algorithmic Control: Conceptualization and Scale Development. ECIS 2023 - [c18]Felix Hirsch, Armin Alizadeh, Martin Wiener, W. Alec Cram:
Algorithmic Control in Platform and Traditional Work Settings: An Updated Conceptual Framework. ECIS 2023 - [c17]W. Alec Cram, John D'Arcy:
Barking Up the Wrong Tree? Reconsidering Policy Compliance as a Dependent Variable within Behavioral Cybersecurity Research. HICSS 2023: 4139-4148 - [c16]Armin Alizadeh, Felix Hirsch, Alexander Benlian, Martin Wiener, W. Alec Cram:
Measuring Workers' Perceptions of Algorithmic Control: Item Development and Content Validity Assessment. HICSS 2023: 6310-6319 - 2022
- [j22]Alexander Benlian, Martin Wiener, W. Alec Cram, Hanna Krasnova, Alexander Maedche, Mareike Möhlmann, Jan Recker, Ulrich Remus:
Algorithmic Management. Bus. Inf. Syst. Eng. 64(6): 825-839 (2022) - [j21]Tobias Bitzer, Martin Wiener, W. Alec Cram:
Algorithmic Transparency: Concepts, Antecedents, and Consequences - A Review and Research Framework. Commun. Assoc. Inf. Syst. 52: 16 (2022) - [j20]W. Alec Cram, Martin Wiener, Monideepa Tarafdar, Alexander Benlian:
Examining the Impact of Algorithmic Control on Uber Drivers' Technostress. J. Manag. Inf. Syst. 39(2): 426-453 (2022) - [c15]W. Alec Cram, Rissaile Mouajou-Kenfack:
Show-and-Tell or Hide-and-Seek? Examining Organizational Cybersecurity Incident Notifications. HICSS 2022: 1-10 - [c14]W. Alec Cram, Jonathan Yuan:
Out with the Old, In with the New: Examining National Cybersecurity Strategy Changes over Time. HICSS 2022: 1-10 - 2021
- [j19]Roman Walser, W. Alec Cram, Edward W. N. Bernroider, Martin Wiener:
Control choices and enactments in IS development projects: Implications for legitimacy perceptions and compliance intentions. Inf. Manag. 58(7): 103522 (2021) - [j18]W. Alec Cram, Jeffrey Gainer Proudfoot, John D'Arcy:
When enough is enough: Investigating the antecedents and consequences of information security fatigue. Inf. Syst. J. 31(4): 521-549 (2021) - 2020
- [j17]W. Alec Cram, Martin Wiener:
Technology-mediated Control: Case Examples and Research Directions for the Future of Organizational Control. Commun. Assoc. Inf. Syst. 46: 4 (2020) - [j16]W. Alec Cram, Mathieu Templier, Guy Paré:
(Re)considering the Concept of Literature Review Reproducibility. J. Assoc. Inf. Syst. 21(5): 10 (2020) - [j15]W. Alec Cram, Jeffrey Gainer Proudfoot, John D'Arcy:
Maximizing Employee Compliance with Cybersecurity Policies. MIS Q. Executive 19(3): 5 (2020) - [c13]Roman Johann Walser, W. Alec Cram, Edward Bernroider, Martin Wiener:
How Control Configurations and Enactments Shape Legitimacy Perceptions and Compliance Intentions in IS Development Projects. ECIS 2020 - [c12]W. Alec Cram, Martin Wiener, Monideepa Tarafdar, Alexander Benlian:
Algorithmic Controls and their Implications for Gig Worker Well-being and Behavior. ICIS 2020
2010 – 2019
- 2019
- [j14]W. Alec Cram:
Agile Development in Practice: Lessons from the Trenches. Inf. Syst. Manag. 36(1): 2-14 (2019) - [j13]Martin Wiener, Magnus Mähring, Ulrich Remus, Carol Saunders, W. Alec Cram:
Moving IS Project Control Research into the Digital Era: The "Why" of Control and the Concept of Control Purpose. Inf. Syst. Res. 30(4): 1387-1401 (2019) - [j12]W. Alec Cram, John D'Arcy, Jeffrey Proudfoot:
Seeing the Forest and the Trees: A Meta-Analysis of the Antecedents to Information Security Policy Compliance. MIS Q. 43(2) (2019) - [c11]W. Alec Cram:
(Re)considering the Concept of Reproducibility of Information Systems Literature Reviews. AMCIS 2019 - 2018
- [j11]W. Alec Cram, Marco Marabelli:
Have your cake and eat it too? Simultaneously pursuing the knowledge-sharing benefits of agile and traditional development approaches. Inf. Manag. 55(3): 322-339 (2018) - [j10]W. Alec Cram, Martin Wiener:
Perceptions of control legitimacy in information systems development. Inf. Technol. People 31(3): 712-740 (2018) - 2017
- [j9]W. Alec Cram, Jeffrey Proudfoot, John D'Arcy:
Organizational information security policies: a review and research framework. Eur. J. Inf. Syst. 26(6): 605-641 (2017) - [c10]Martin Wiener, W. Alec Cram, Ulrich Remus:
The View from the Top - How Senior Executives Exercise control over Information Systems Projects to Enhance Performance. ECIS 2017: 92 - [c9]W. Alec Cram, Jeffrey Proudfoot, John D'Arcy:
Seeing the forest and the trees: A meta-analysis of information security policy compliance literature. HICSS 2017: 1-10 - [c8]Mark-David McLaughlin, John D'Arcy, W. Alec Cram, Janis L. Gogan:
Capabilities and Skill Configurations of Information Security Incident Responders. HICSS 2017: 1-10 - 2016
- [j8]W. Alec Cram, John D'Arcy:
Teaching Information Security in Business Schools: Current Practices and a Proposed Direction for the Future. Commun. Assoc. Inf. Syst. 39: 3 (2016) - [j7]W. Alec Cram, Sue Newell:
Mindful revolution or mindless trend? Examining agile development as a management fashion. Eur. J. Inf. Syst. 25(2): 154-169 (2016) - [j6]W. Alec Cram, M. Kathryn Brohman, Yolande E. Chan, R. Brent Gallupe:
Information systems control alignment: Complementary and conflicting systems development controls. Inf. Manag. 53(2): 183-196 (2016) - [j5]W. Alec Cram, M. Kathryn Brohman, R. Brent Gallupe:
Hitting a moving target: a process model of information systems control change. Inf. Syst. J. 26(3): 195-226 (2016) - [j4]W. Alec Cram, Kathryn Brohman, R. Brent Gallupe:
Information Systems Control: A Review and Framework for Emerging Information Systems Processes. J. Assoc. Inf. Syst. 17(4): 2 (2016) - [j3]W. Alec Cram, R. Brent Gallupe:
A Method to Evaluate Information Systems Control Alignment. J. Inf. Syst. 30(1): 117-135 (2016) - 2015
- [j2]W. Alec Cram, M. Kathryn Brohman, R. Brent Gallupe:
Addressing the Control Challenges of the Enterprise Architecture Process. J. Inf. Syst. 29(2): 161-182 (2015) - [c7]W. Alec Cram, Marco Marabelli:
Have Your Cake and Eat it Too? Managing Knowledge in Hybrid Agile-Traditional Development Projects. AMCIS 2015 - [c6]Ulrich Remus, Martin Wiener, Magnus Mähring, Carol S. Saunders, W. Alec Cram:
Why Do You Control? The Concept of Control Purpose and Its Implications for IS Project Control Research. ICIS 2015 - 2013
- [j1]W. Alec Cram, M. Kathryn Brohman:
Controlling information systems development: a new typology for an evolving field. Inf. Syst. J. 23(2): 137-154 (2013) - 2011
- [c5]W. Alec Cram:
Information Systems Control: A Review and Synthesis of the Literature. AMCIS 2011 - [c4]W. Alec Cram:
Aligning Organizational Values in Systems Development Projects: An Empirical Study. HICSS 2011: 1-10 - [c3]W. Alec Cram, M. Kathryn Brohman, Brent Gallupe, Yolande E. Chan:
Exploring Information Systems Control Alignment in Organizations. ICIS 2011 - 2010
- [c2]W. Alec Cram, M. Kathryn Brohman:
Beyond Modes: a New Typology of ISD Control. ICIS 2010: 94
2000 – 2009
- 2009
- [c1]W. Alec Cram:
Success Factors for Information Systems Outsourcing: A Meta-Analysis. AMCIS 2009: 554
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint