default search action
Merrill Warkentin
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j98]Alaa Nehme, Meng (Leah) Li, Merrill Warkentin:
Adaptive and maladaptive factors behind password manager use: A hope-extended protection motivation perspective. Comput. Secur. 144: 103941 (2024) - [j97]Stephen L. France, Mahyar Sharif Vaghefi, Brett Kazandjian, Merrill Warkentin:
Bridging information systems and marketing: Charting collaborative pathways. Decis. Support Syst. 187: 114328 (2024) - [j96]Karen Renaud, Merrill Warkentin, Ganna Pogrebna, Karl van der Schyff:
VISTA: An inclusive insider threat taxonomy, with mitigation strategies. Inf. Manag. 61(1): 103877 (2024) - [j95]Ali Vedadi, Merrill Warkentin, Detmar W. Straub, Jordan Shropshire:
Fostering information security compliance as organizational citizenship behavior. Inf. Manag. 61(5): 103968 (2024) - [j94]Majid Mohammad Shafiee, Merrill Warkentin, Setare Motamed:
Do human capital and relational capital influence knowledge-intensive firm competitiveness? The roles of export orientation and marketing knowledge capability. J. Knowl. Manag. 28(1): 138-160 (2024) - [c42]Yuxiang Hong, Da Wang, Majid Mohammad Shafiee, Merrill Warkentin:
Formation of Cybersecurity Awareness: A Positive Psychological Perspective. AMCIS 2024 - [c41]Kyungmyung Jang, Merrill Warkentin:
The Role of Blockchain Technology Adoption on Data Breaches. AMCIS 2024 - [c40]Zhao Liu, Merrill Warkentin, Jutong Wen, Xinwei Liu:
Humanizing AI Customer Service: Want to Switch to Human Agents? AMCIS 2024 - [c39]Anthony Vance, Karen Renaud, Allen C. Johnston, Merrill Warkentin:
Introduction to the Minitrack on Innovative Behavioral IS Security and Privacy Research. HICSS 2024: 4712-4713 - [c38]Alper Yayla, Merrill Warkentin, Ersin Dincelli:
Introduction to the Minitrack on The Dark and Bright Sides of the Metaverse. HICSS 2024: 4899-4900 - 2023
- [j93]Allen C. Johnston, Paul Michael Di Gangi, France Bélanger, Robert E. Crossler, Mikko T. Siponen, Merrill Warkentin, Tripti Singh:
Seeking rhetorical validity in fear appeal research: An application of rhetorical theory. Comput. Secur. 125: 103020 (2023) - [j92]Edwin Donald Frauenstein, Stephen Flowerday, Syden Mishi, Merrill Warkentin:
Unraveling the behavioral influence of social media on phishing susceptibility: A Personality-Habit-Information Processing model. Inf. Manag. 60(7): 103858 (2023) - [j91]Ashraf Mady, Saurabh Gupta, Merrill Warkentin:
The effects of knowledge mechanisms on employees' information security threat construal. Inf. Syst. J. 33(4): 790-841 (2023) - [j90]Adéle da Veiga, Steven Furnell, Yuxiang Hong, Merrill Warkentin:
Introduction to the special issue on insider threats in cybersecurity. J. Inf. Secur. Appl. 79: 103585 (2023) - [j89]Botong Xue, Merrill Warkentin, Leigh A. Mutchler, Puzant Balozian:
Self-efficacy in Information Security: A Replication Study. J. Comput. Inf. Syst. 63(1): 1-10 (2023) - [c37]Anthony Vance, Merrill Warkentin, Allen C. Johnston:
Introduction to the Minitrack on Innovative Behavioral IS Security and Privacy Research. HICSS 2023: 4119-4120 - 2022
- [j88]Varol O. Kayhan, Merrill Warkentin:
Seeking Information Using Search Engines: The Impact of Negation on Judgments. Commun. Assoc. Inf. Syst. 52: 5 (2022) - [j87]Zhenya Tang, Zhongyun Zhou, Merrill Warkentin:
A contextualized comprehensive action determination model for predicting consumer electronics recommerce platform usage: A sequential mixed-methods approach. Inf. Manag. 59(3): 103617 (2022) - [j86]Zhenya Tang, Zhongyun Zhou, Feng Xu, Merrill Warkentin:
Apps within apps: predicting government WeChat mini-program adoption from trust-risk perspective and innovation diffusion theory. Inf. Technol. People 35(3): 1170-1190 (2022) - [j85]Feng Xu, Carol Hsu, Xin (Robert) Luo, Merrill Warkentin:
Reactions to Abusive Supervision: Neutralization and IS Misuse. J. Comput. Inf. Syst. 62(3): 632-641 (2022) - [j84]Tao Eric Hu, Zhenya Tang, Merrill Warkentin, Na Wen:
SLSS Gamification as an E-Commerce Model in China. J. Comput. Inf. Syst. 62(5): 921-939 (2022) - [j83]Zhenya Tang, Andrew Miller, Zhongyun Zhou, Merrill Warkentin:
Understanding Rumor Combating Behavior on Social Media. J. Comput. Inf. Syst. 62(6): 1112-1124 (2022) - [c36]Alaa Nehme, Merrill Warkentin, Kyungmyung Jang, Sumin Kim:
Beyond Rational Information Security Decisions: An Alternate View. AMCIS 2022 - [c35]Merrill Warkentin, Allen C. Johnston, Anthony Vance:
Introduction to the Minitrack on Innovative Behavioral IS Security and Privacy Research. HICSS 2022: 1 - [c34]Yimer Mohammed Hussien, Merrill Warkentin, Tibebe Beshah:
Understanding the Effects of RationalityBased Theories on Employees' Deviant Use of IS Resources: A Cross Cultural Examination. PACIS 2022: 57 - 2021
- [j82]Gaurav Bansal, Merrill Warkentin:
Do You Still Trust?: The Role of Age, Gender, and Privacy Concern on Trust after Insider Data Breaches. Data Base 52(4): 9-44 (2021) - [j81]Zhenya Tang, Andrew Miller, Zhongyun Zhou, Merrill Warkentin:
Does government social media promote users' information security behavior towards COVID-19 scams? Cultivation effects and protective motivations. Gov. Inf. Q. 38(2): 101572 (2021) - [j80]Sanjay Goel, Kevin J. Williams, Jingyi Huang, Merrill Warkentin:
Can financial incentives help with the struggle for security policy compliance? Inf. Manag. 58(4): 103447 (2021) - [j79]Ali Vedadi, Merrill Warkentin, Alan R. Dennis:
Herd behavior in information security decision-making. Inf. Manag. 58(8): 103526 (2021) - [j78]Brad S. Trinkle, Merrill Warkentin, Kalana Malimage, Nirmalee I. Raddatz:
High-Risk Deviant Decisions: Does Neutralization Still Play a Role? J. Assoc. Inf. Syst. 22(3): 3 (2021) - [c33]Shan Xiao, Merrill Warkentin:
Too Bored to Engage: An Exploratory Study of Information Security-related Boredom. AMCIS 2021 - [c32]Robert E. Crossler, France Bélanger, Carlos Torres, Allen C. Johnston, Merrill Warkentin:
Understanding Unstable Information Systems Phenomena: A Punctuated Equilibrium Perspective. HICSS 2021: 1-10 - [c31]Merrill Warkentin, Allen C. Johnston, Anthony Vance:
Introduction to the Minitrack on Innovative Behavioral IS Security and Privacy Research. HICSS 2021: 1 - [p3]Steven Furnell, Paul S. Haskell-Dowland, Manish Agrawal, Richard L. Baskerville, Anirban Basu, Matt Bishop, Jorge Cuéllar, Sara Foresti, Lynn Futcher, Nurit Gal-Oz, Tejaswini (Teju) Herath, Christian Damsgaard Jensen, Allen C. Johnston, Wouter Joosen, Giovanni Livraga, Javier López, Stephen Marsh, Fabio Martinelli, Fabio Massacci, Aljosa Pasic, Stef Schinagl, Abbas Shahim, Kerry-Lynn Thomson, Jaideep Vaidya, Tony Vance, Merrill Warkentin:
Information Security and Privacy - Challenges and Outlook. IFIP's Exciting First 60+ Years 2021: 383-401 - 2020
- [j77]Feng Xu, Merrill Warkentin:
Integrating elaboration likelihood model and herd theory in information security message persuasiveness. Comput. Secur. 98: 102009 (2020) - [j76]Chengqi (John) Guo, Merrill Warkentin, Xin (Robert) Luo, Anil Gurung, J. P. Shim:
An imposed etic approach with Schwartz polar dimensions to explore cross-cultural use of social network services. Inf. Manag. 57(8): 103261 (2020) - [j75]Merrill Warkentin, Craig P. Orgeron:
Using the security triad to assess blockchain technology in public sector applications. Int. J. Inf. Manag. 52: 102090 (2020) - [j74]Ali Vedadi, Merrill Warkentin:
Can Secure Behaviors Be Contagious? A Two-Stage Investigation of the Influence of Herd Behavior on Security Decisions. J. Assoc. Inf. Syst. 21(2): 3 (2020) - [j73]Leigh A. Mutchler, Merrill Warkentin:
Experience Matters: The Role of Vicarious Experience in Secure Actions. J. Database Manag. 31(2): 1-20 (2020) - [j72]Nirmalee I. Raddatz, Thomas F. Stafford, Craig Van Slyke, Merrill Warkentin:
Grassroots Adoption of Cloud-Based Storage Solutions. J. Inf. Syst. 34(3): 213-232 (2020) - [c30]Pardon Blessings Maoneke, Stephen V. Flowerday, Merrill Warkentin:
Evaluating the Usability of a Multilingual Passphrase Policy. AMCIS 2020 - [c29]Feng Xu, Botong Xue, Merrill Warkentin:
How do Leader Emotional Displays Influence Employees' Information Security Effort? AMCIS 2020 - [c28]Sanjay Goel, Kevin J. Williams, Jingyi Huang, Merrill Warkentin:
Understanding the Role of Incentives in Security Behavior. HICSS 2020: 1-6 - [c27]Allen C. Johnston, Merrill Warkentin, Anthony Vance:
Introduction to the Minitrack on Innovative Behavioral IS Security and Privacy Research. HICSS 2020: 1
2010 – 2019
- 2019
- [j71]Davide C. Orazi, Merrill Warkentin, Allen C. Johnston:
Integrating Construal-level Theory in Designing Fear Appeals in IS Security Research. Commun. Assoc. Inf. Syst. 45: 22 (2019) - [j70]Karen Renaud, Robert F. Otondo, Merrill Warkentin:
"This is the way 'I' create my passwords" ... does the endowment effect deter people from changing the way they create their passwords? Comput. Secur. 82: 241-260 (2019) - [j69]Shwadhin Sharma, Merrill Warkentin:
Do I really belong?: Impact of employment status on information security policy compliance. Comput. Secur. 87 (2019) - [j68]Allen C. Johnston, Merrill Warkentin, Alan R. Dennis, Mikko T. Siponen:
Speak their Language: Designing Effective Messages to Improve Employees' Information Security Decision Making. Decis. Sci. 50(2): 245-284 (2019) - [j67]Zhenya Tang, Leida Chen, Zhongyun Zhou, Merrill Warkentin, Mark Lee Gillenson:
The effects of social media use on control of corruption and moderating role of cultural tightness-looseness. Gov. Inf. Q. 36(4) (2019) - [j66]Jeffrey D. Wall, Merrill Warkentin:
Perceived argument quality's effect on threat and coping appraisals in fear appeals: An experiment and exploration of realism check heuristics. Inf. Manag. 56(8) (2019) - [j65]Dustin Ormond, Merrill Warkentin, Robert E. Crossler:
Integrating Cognition with an Affective Lens to Better Understand Information Security Policy Compliance. J. Assoc. Inf. Syst. 20(12): 4 (2019) - [j64]Puzant Balozian, Dorothy E. Leidner, Merrill Warkentin:
Managers' and Employees' Differing Responses to Security Approaches. J. Comput. Inf. Syst. 59(3): 197-210 (2019) - [c26]Merrill Warkentin, Allen C. Johnston, Anthony Vance:
Introduction to the Minitrack on Innovative Behavioral IS Security and Privacy Research. HICSS 2019: 1 - 2018
- [j63]Robert F. Otondo, Robert E. Crossler, Merrill Warkentin:
Ranking Factors by Importance in Factorial Survey Analysis. Commun. Assoc. Inf. Syst. 42: 8 (2018) - [j62]Robert E. Crossler, Paul Michael Di Gangi, Allen C. Johnston, France Bélanger, Merrill Warkentin:
Providing Theoretical Foundations: Developing an Integrated Set of Guidelines for Theory Adaptation. Commun. Assoc. Inf. Syst. 43: 31 (2018) - [j61]Philip Menard, Merrill Warkentin, Paul Benjamin Lowry:
The impact of collectivism and psychological ownership on protection motivation: A cross-cultural examination. Comput. Secur. 75: 147-166 (2018) - [j60]Karen Renaud, Stephen Flowerday, Merrill Warkentin, Paul Cockshott, Craig P. Orgeron:
Is the responsibilization of the cyber security risk reasonable and judicious? Comput. Secur. 78: 198-211 (2018) - [j59]Ali Vedadi, Merrill Warkentin:
Secure Behavior over Time: Perspectives from the Theory of Process Memory. Data Base 49(SI): 39-48 (2018) - [j58]Merrill Warkentin, Shwadhin Sharma, David Gefen, Gregory M. Rose, Paul A. Pavlou:
Social identity and trust in internet-based voting adoption. Gov. Inf. Q. 35(2): 195-209 (2018) - [j57]Robert Willison, Merrill Warkentin, Allen C. Johnston:
Examining employee computer abuse intentions: insights from justice, deterrence and neutralization perspectives. Inf. Syst. J. 28(2): 266-293 (2018) - [j56]Jordan B. Barlow, Merrill Warkentin, Dustin Ormond, Alan R. Dennis:
Don't Even Think About It! The Effects of Antineutralization, Informational, and Normative Communication on Information Security Compliance. J. Assoc. Inf. Syst. 19(8): 3 (2018) - [c25]Andrew Miller, Merrill Warkentin:
Why Lie?: Deception of Health Information. AMCIS 2018 - [c24]Merrill Warkentin, Sanjay Goel, Kevin J. Williams, Karen Renaud:
Are we Predisposed to Behave Securely? Influence of Risk Disposition on Individual Security Behaviours. ECIS 2018: 25 - [c23]Linda G. Wallace, Merrill Warkentin, Izak Benbasat:
How Do You Handle It? An Investigation of Facebook Affordances and Envy. HICSS 2018: 1-10 - [c22]Merrill Warkentin, Allen C. Johnston, Anthony Vance:
Introduction to the Minitrack on Innovative Behavioral IS Security and Privacy Research. HICSS 2018: 1 - [c21]Ali Vedadi, Merrill Warkentin:
Sustained Secure Behavior and the Role of Self-Efficacy. ICIS 2018 - 2017
- [j55]Jie Zhang, Han Li, Xin (Robert) Luo, Merrill Warkentin:
Exploring the Effects of the Privacy-Handling Management Styles of Social Networking Sites on User Satisfaction: A Conflict Management Perspective. Decis. Sci. 48(5): 956-989 (2017) - [j54]Linda G. Wallace, Tabitha L. James, Merrill Warkentin:
How do you feel about your friends? Understanding situational envy in online social networks. Inf. Manag. 54(5): 669-682 (2017) - [j53]Tabitha L. James, Linda G. Wallace, Merrill Warkentin, Byung Cho Kim, Stéphane E. Collignon:
Exposing others' information on online social networks (OSNs): Perceived shared risk, its determinants, and its influence on OSN privacy control use. Inf. Manag. 54(7): 851-865 (2017) - [j52]Shuyuan Mary Ho, Paul Benjamin Lowry, Merrill Warkentin, Yanyun Yang, Jonathan M. Hollister:
Gender deception in asynchronous online communication: A path analysis. Inf. Process. Manag. 53(1): 21-41 (2017) - [j51]Shuyuan Mary Ho, Merrill Warkentin:
Leader's dilemma game: An experimental design for cyber insider threat research. Inf. Syst. Frontiers 19(2): 377-396 (2017) - [j50]Merrill Warkentin, Sanjay Goel, Philip Menard:
Shared Benefits and Information Privacy: What Determines Smart Meter Technology Adoption? J. Assoc. Inf. Syst. 18(11): 3 (2017) - [j49]James Lee, Merrill Warkentin, Robert E. Crossler, Robert F. Otondo:
Implications of Monitoring Mechanisms on Bring Your Own Device Adoption. J. Comput. Inf. Syst. 57(4): 309-318 (2017) - [j48]Tabitha L. James, Paul Benjamin Lowry, Linda G. Wallace, Merrill Warkentin:
The Effect of Belongingness on Obsessive-Compulsive Disorder in the Use of Online Social Networks. J. Manag. Inf. Syst. 34(2): 560-596 (2017) - [c20]Ersin Dincelli, Sanjay Goel, Merrill Warkentin:
Understanding Nuances of Privacy and Security in the Context of Information Systems. AMCIS 2017 - [c19]Ali Vedadi, Merrill Warkentin:
Developing Measurement Scales for Passwords Uniqueness and Secrecy. AMCIS 2017 - [c18]Merrill Warkentin, Allen C. Johnston, Anthony Vance:
Introduction to Innovative Behavioral IS Security and Privacy Research Minitrack. HICSS 2017: 1 - [c17]Karen Renaud, Merrill Warkentin:
Risk Homeostasis in Information Security: Challenges in Confirming Existence and Verifying Impact. NSPW 2017: 57-69 - 2016
- [j47]Ali Vedadi, Merrill Warkentin:
Continuance Intention on Using Mobile Banking Applications: A Replication Study of Information Systems Continuance Model. AIS Trans. Replication Res. 2: 7 (2016) - [j46]James Lee, Merrill Warkentin, Allen C. Johnston:
A Broader View of Perceived Risk during Internet Transactions. Commun. Assoc. Inf. Syst. 38: 8 (2016) - [j45]Merrill Warkentin, Allen C. Johnston, Jordan Shropshire, William D. Barnett:
Continuance of protective security behavior: A longitudinal study. Decis. Support Syst. 92: 25-35 (2016) - [j44]Allen C. Johnston, Merrill Warkentin, Maranda E. McBride, Lemuria D. Carter:
Dispositional and situational factors: influences on information security policy violations. Eur. J. Inf. Syst. 25(3): 231-251 (2016) - [j43]Tabitha L. James, Quinton Nottingham, Stéphane E. Collignon, Merrill Warkentin, Jennifer L. Ziegelmayer:
The interpersonal privacy identity (IPI): development of a privacy as control model. Inf. Technol. Manag. 17(4): 341-360 (2016) - [j42]Merrill Warkentin, Eric A. Walden, Allen C. Johnston, Detmar W. Straub:
Neural Correlates of Protection Motivation for Secure IT Behaviors: An fMRI Examination. J. Assoc. Inf. Syst. 17(3): 1 (2016) - [j41]Iris Reychav, Merrill Warkentin, Martin J. Ndicu:
Tablet Adoption with Smart School Website Technology. J. Comput. Inf. Syst. 56(4): 280-287 (2016) - [c16]Merrill Warkentin, Anthony Vance, Allen C. Johnston:
Introduction to the Minitrack on Innovative Behavioral IS Security and Privacy Research. HICSS 2016: 3635 - 2015
- [j40]Jordan Shropshire, Merrill Warkentin, Shwadhin Sharma:
Personality, attitudes, and intentions: Predicting initial adoption of information security behavior. Comput. Secur. 49: 177-191 (2015) - [j39]Merrill Warkentin, Brigitte Charles-Pauvers, Patrick Y. K. Chau:
Cross-cultural IS research: perspectives from Eastern and Western traditions. Eur. J. Inf. Syst. 24(3): 229-233 (2015) - [j38]Chuan Luo, Xin (Robert) Luo, Yun Xu, Merrill Warkentin, Choon-Ling Sia:
Examining the moderating role of sense of membership in online review evaluations. Inf. Manag. 52(3): 305-316 (2015) - [j37]Tabitha L. James, Merrill Warkentin, Stéphane E. Collignon:
A dual privacy decision model for online social networks. Inf. Manag. 52(8): 893-908 (2015) - [j36]Dustin Ormond, Merrill Warkentin:
Is this a Joke? The Impact of Message Manipulations on Risk Perceptions. J. Comput. Inf. Syst. 55(2): 9-19 (2015) - [j35]Roger McHaney, Merrill Warkentin, David A. Sachs, Michael Brian Pope, Dustin Ormond:
Teaching Social Media in Business. J. Inf. Technol. Educ. Innov. Pract. 14: 39-62 (2015) - [j34]Allen C. Johnston, Merrill Warkentin, Mikko T. Siponen:
An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to the Human Asset Through Sanctioning Rhetoric. MIS Q. 39(1): 113-134 (2015) - [c15]Merrill Warkentin, Allen C. Johnston, Anthony Vance:
Introduction to the Innovative Behavioral IS Security and Privacy Research Minitrack. HICSS 2015: 3452 - 2014
- [j33]Philip Menard, Robert Gatlin, Merrill Warkentin:
Threat Protection and Convenience: Antecedents of Cloud-Based Data Backup. J. Comput. Inf. Syst. 55(1): 83-91 (2014) - [j32]Brad S. Trinkle, Robert E. Crossler, Merrill Warkentin:
I'm Game, are You? Reducing Real-World Security Threats by Managing Employee Activity in Online Social Networks. J. Inf. Syst. 28(2): 307-327 (2014) - [c14]Merrill Warkentin, Allen C. Johnston, Anthony Vance:
Introduction to Innovative Behavioral IS Security and Privacy Research Minitrack. HICSS 2014: 3148 - [p2]Merrill Warkentin, Leigh A. Mutchler:
Behavioral Information Security Management. Computing Handbook, 3rd ed. (2) 2014: 54: 1-20 - 2013
- [j31]Robert E. Crossler, Allen C. Johnston, Paul Benjamin Lowry, Qing Hu, Merrill Warkentin, Richard L. Baskerville:
Future directions for behavioral information security research. Comput. Secur. 32: 90-101 (2013) - [j30]Jordan B. Barlow, Merrill Warkentin, Dustin Ormond, Alan R. Dennis:
Don't make excuses! Discouraging neutralization to reduce IT policy violation. Comput. Secur. 39: 145-159 (2013) - [j29]Xin (Robert) Luo, Merrill Warkentin, Han Li:
Understanding Technology Adoption Trade-Offs: A Conjoint Analysis Approach. J. Comput. Inf. Syst. 53(3): 65-74 (2013) - [j28]Robert Willison, Merrill Warkentin:
Beyond Deterrence: An Expanded View of Employee Computer Abuse. MIS Q. 37(1): 1-20 (2013) - [c13]James Lee, Robert E. Crossler, Merrill Warkentin:
Implications of Monitoring Mechanisms on Bring Your Own Device (BYOD) Adoption. ICIS 2013 - 2012
- [j27]Michael Brian Pope, Merrill Warkentin, Leigh A. Mutchler, Xin (Robert) Luo:
The Domain Name System - Past, Present, and Future. Commun. Assoc. Inf. Syst. 30: 21 (2012) - [j26]Michael Brian Pope, Merrill Warkentin, Ernst Bekkering, Mark B. Schmidt:
Digital Steganography - An Introduction to Techniques and Tools. Commun. Assoc. Inf. Syst. 30: 22 (2012) - [j25]Merrill Warkentin, Vijayan Sugumaran, Robert Sainsbury:
The role of intelligent agents and data mining in electronic partnership management. Expert Syst. Appl. 39(18): 13277-13288 (2012) - [j24]Michael Brian Pope, Merrill Warkentin, Xin (Robert) Luo:
Evolutionary Malware: Mobile Malware, Botnets, and Malware Toolkits. Int. J. Wirel. Networks Broadband Technol. 2(3): 52-60 (2012) - [c12]Merrill Warkentin, Nirmalee Malimage:
Overcoming Mixed-Gender Requirements Misspecification with the Modified Coherence Method. AMCIS 2012 - [c11]Merrill Warkentin, Maranda E. McBride, Lemuria D. Carter, Allen C. Johnston:
The Role of Individual Characteristics on Insider Abuse Intentions. AMCIS 2012 - [c10]Merrill Warkentin, Shwadhin Sharma, David Gefen, Paul A. Pavlou, Gregory M. Rose:
Government of the People, By the People: A Look at Trust in eGovernment. AMCIS 2012 - 2011
- [j23]Han Li, Ashish Gupta, Xin (Robert) Luo, Merrill Warkentin:
Exploring the impact of instant messaging on subjective task complexity and user satisfaction. Eur. J. Inf. Syst. 20(2): 139-155 (2011) - [j22]Merrill Warkentin, Allen C. Johnston, Jordan Shropshire:
The influence of the informal social learning environment on information privacy policy compliance efficacy and intention. Eur. J. Inf. Syst. 20(3): 267-284 (2011) - [c9]Merrill Warkentin, Robert Willison, Allen C. Johnston:
The Role of Perceptions of Organizational Injustice and Techniques of Neutralization in Forming Computer Abuse Intentions. AMCIS 2011 - 2010
- [j21]Jordan Shropshire, Merrill Warkentin, Allen C. Johnston:
Impact of Negative Message Framing on Security Adoption. J. Comput. Inf. Syst. 51(1): 41-51 (2010) - [j20]Allen C. Johnston, Merrill Warkentin:
The Influence of Perceived Source Credibility on End User Attitudes and Intentions to Comply with Recommended IT Actions. J. Organ. End User Comput. 22(3): 1-21 (2010) - [j19]Allen C. Johnston, Merrill Warkentin:
Fear Appeals and Information Security Behaviors: An Empirical Study. MIS Q. 34(3): 549-566 (2010)
2000 – 2009
- 2009
- [j18]Merrill Warkentin, Robert S. Moore, Ernst Bekkering, Allen C. Johnston:
Analysis of systems development project risks: an integrative framework. Data Base 40(2): 8-27 (2009) - [j17]Merrill Warkentin, Robert Willison:
Behavioral and policy issues in information systems security: the insider threat. Eur. J. Inf. Syst. 18(2): 101-105 (2009) - [j16]Ernst Bekkering, Allen C. Johnston, Merrill Warkentin, Mark B. Schmidt:
An Empirical Assessment of Technology Adoption as a Choice between Alternatives. Inf. Resour. Manag. J. 22(4): 23-44 (2009) - [c8]Xin (Robert) Luo, Merrill Warkentin, Allen C. Johnston:
The Impact of National Culture on Workplace Privacy Expectations in the Context of Information Security Assurance. AMCIS 2009: 521 - 2008
- [j15]Allen C. Johnston, Merrill Warkentin:
Information privacy compliance in the healthcare industry. Inf. Manag. Comput. Secur. 16(1): 5-19 (2008) - [j14]Merrill Warkentin, Ernst Bekkering, Mark B. Schmidt:
Steganography: Forensic, Security, and Legal Issues. J. Digit. Forensics Secur. Law 3(2): 17-34 (2008) - 2007
- [c7]Merrill Warkentin, Ernst Bekkering, Allen C. Johnston, Robert S. Moore:
Risk Perspectives in Systems Development. AMCIS 2007: 273 - [c6]Merrill Warkentin, Jordan Shropshire, Allen C. Johnston:
The IT Security Adoption Conundrum: An Initial Step Toward Validation of Applicable Measures. AMCIS 2007: 276 - [c5]Merrill Warkentin, Chengqi Guo, Xin (Robert) Luo, Feifei Xie:
An Assessment of U.S. and Chinese Online Gaming Environments and Futures. AMCIS 2007: 277 - [p1]Ross Hightower, Lutfus Sayeed, Merrill Warkentin:
A Longitudinal Study of Information Exchange in Computer-Mediated and Face-to-Face Groups. Decision Support for Global Enterprises 2007: 93-112 - 2006
- [c4]Merrill Warkentin, Allen C. Johnston, April Adams:
User Interaction with Healthcare Information Systems: Do Healthcare Professionals Want to Comply with HIPAA? AMCIS 2006: 326 - [c3]Jordan Shropshire, Merrill Warkentin, Allen C. Johnston, Mark B. Schmidt:
Personality and IT security: An application of the five-factor model. AMCIS 2006: 415 - 2005
- [j13]Merrill Warkentin, Xin (Robert) Luo, Gary F. Templeton:
A framework for spyware assessment. Commun. ACM 48(8): 79-84 (2005) - [j12]David Gefen, Gregory M. Rose, Merrill Warkentin, Paul A. Pavlou:
Cultural Diversity and Trust in IT Adoption: A Comparison of Potential e-Voters in the USA and South Africa. J. Glob. Inf. Manag. 13(1): 54-78 (2005) - [c2]Cheon-Pyo Lee, Merrill Warkentin:
The Role of Technology Anxiety and Self-Efficacy in Information Technology Training. AMCIS 2005: 309 - 2004
- [j11]Merrill Warkentin, Kimberly Davis, Ernst Bekkering:
Introducing the Check-Off Password System (COPS): An Advancement in User Authentication Methods and Information Security. J. Organ. End User Comput. 16(3): 41-58 (2004) - [c1]Cheon-Pyo Lee, Merrill Warkentin, Haiwook Choi:
The Role of Technological and Social Factors on the Adoption of Mobile Payment Technologies. AMCIS 2004: 333 - 2003
- [j10]Jason E. Lueg, Robert S. Moore, Merrill Warkentin:
Patient Health Information Search: An Exploratory Model of Web-based Search Behavior. J. Organ. End User Comput. 15(4): 49-61 (2003) - 2002
- [j9]Peter Tarasewich, Robert C. Nickerson, Merrill Warkentin:
Issues in Mobile E-Commerce. Commun. Assoc. Inf. Syst. 8: 3 (2002) - [j8]Jung P. Shim, Merrill Warkentin, James F. Courtney, Daniel J. Power, Ramesh Sharda, Christer Carlsson:
Past, present, and future of decision support technology. Decis. Support Syst. 33(2): 111-126 (2002) - [j7]Merrill Warkentin, David Gefen, Paul A. Pavlou, Gregory M. Rose:
Encouraging Citizen Adoption of eGovernment by Building Trust. Electron. Mark. 12(3): 157-162 (2002) - [j6]Peter Tarasewich, Merrill Warkentin:
Information Everywhere. Inf. Syst. Manag. 19(1): 8-13 (2002) - 2000
- [j5]Merrill Warkentin, Ravi Bapna, Vijayan Sugumaran:
The Role of Mass Customization in Enhancing Supply Chain Relationships in B2C E-Commerce Markets. J. Electron. Commer. Res. 1(2): 45-52 (2000) - [j4]Peter Tarasewich, Merrill Warkentin:
Issues in wireless E-commerce. SIGecom Exch. 1(1): 21-25 (2000)
1990 – 1999
- 1999
- [j3]Merrill Warkentin, Peggy M. Beranek:
Training to improve virtual team communication. Inf. Syst. J. 9(4): 271-290 (1999) - 1992
- [j2]Karen D. Loch, Houston H. Carr, Merrill Warkentin:
Threats to Information Systems: Today's Reality, Yesterday's Understanding. MIS Q. 16(2): 173-186 (1992)
1980 – 1989
- 1989
- [j1]Sue E. Armas, Merrill Warkentin, Octavio A. Armas:
Expert systems in laboratory medicine and pathology. Artif. Intell. Medicine 1(2): 79-85 (1989)
Coauthor Index
aka: Tony Vance
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-10 22:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint