Zobrazeno 1 - 10
of 24
pro vyhledávání: '"Jeffrey Gainer Proudfoot"'
Publikováno v:
Information Systems Journal. 31:521-549
Autor:
J. Eric Case, Ann-Frances Cameron, Douglas P. Twitchell, Jeffrey Gainer Proudfoot, Judee K. Burgoon, Nathan W. Twyman
Publikováno v:
Journal of Management Information Systems. 37:377-395
Deception is an unfortunate staple in group work. Guarding against team members’ deceptive tactics and alternative agendas is difficult and may seem even more difficult in technology-driven busines...
Publikováno v:
MIS Quarterly Executive. :183-198
Autor:
G. Mark Grimes, Jay F. Nunamaker, Jeffrey L. Jenkins, Joseph S. Valacich, Jeffrey Gainer Proudfoot
Publikováno v:
Journal of the Association for Information Systems. 20:1-32
Publikováno v:
MIS Quarterly. 43:525-554
A rich stream of research has identified numerous antecedents to employee compliance (and noncompliance) with information security policies. However, the number of competing theoretical perspectives and inconsistencies in the reported findings have h
Publikováno v:
The American Journal of Psychology. 131:347-367
A Deceptive Belief Inventory scale is developed and validated using 10 first-order factors to represent 3 second-order constructs (deception confidence, duping delight, and guiltless deception). A new theoretical model describing how deception confid
Publikováno v:
European Journal of Information Systems. 26:605-641
A major stream of research within the field of information systems security examines the use of organizational policies that specify how users of information and technology resources should behave ...
Publikováno v:
Behaviour & Information Technology. 37:16-37
The nearly ubiquitous use of online social networks generally entails substantial personal disclosure and elicits significant privacy concerns. This research uses Social Exchange Theory and the imp...
Publikováno v:
Journal of Information Technology Teaching Cases. 6:99-110
This case describes the development of the HealthCare.gov website front-end, systems and databases supporting the implementation of the Affordable Care Act. In late October 2013, US Health and Human Services Secretary Kathleen Sebelius and US Centers
Publikováno v:
Computers & Security. 60:37-51
Hackers pose a continuous and unrelenting threat. Industry and academic researchers alike can benefit from a greater understanding of how hackers engage in criminal behavior. A limiting factor of hacker research is the inability to verify that self-p