Refining technology threat avoidance theory D Carpenter, DK Young, P Barrett, AJ McLeod Communications of the Association for Information Systems 44, 2019 | 64 | 2019 |
Malware avoidance motivations and behaviors: A technology threat avoidance replication DK Young, D Carpenter, A McLeod AIS Transactions on Replication Research 2 (1), 8, 2016 | 44 | 2016 |
Exploring hospitals’ use of Facebook: thematic analysis N Kordzadeh, DK Young Journal of medical Internet research 20 (5), e9549, 2018 | 41 | 2018 |
How social media analytics can inform content strategies N Kordzadeh, DK Young Journal of Computer Information Systems 62 (1), 128-140, 2022 | 30 | 2022 |
Framing information security budget requests to influence investment decisions NL Beebe, DK Young, FR Chang Communications of the Association for Information Systems 35 (1), 7, 2014 | 25 | 2014 |
Examining the influence of occupational characteristics, gender and work-life balance on IT professionals' occupational satisfaction and occupational commitment DK Young, AJ McLeod, D Carpenter Information Technology & People 36 (3), 1270-1297, 2023 | 18 | 2023 |
Understanding how hospitals use social media: An exploratory study of Facebook posts N Kordzadeh, D Young | 17 | 2015 |
IT career counseling: are occupational congruence and the job characteristics model effective at predicting IT job satisfaction? D Carpenter, DK Young, A McLeod Michele Journal of Information Systems Education 29 (4), 225-238, 2018 | 15 | 2018 |
An examination of factors that influence students’ IT career decisions DK Young, D Carpenter, M Maasberg Journal of Computer Information Systems 58 (3), 253-263, 2018 | 13 | 2018 |
Personality, gender and careers in information technology J Warren, D Young, K Williams | 11 | 2012 |
An empirical examination of an agile contingent project/method fit model DK Young, NL Beebe, G Dietrich, CZ Liu Communications of the Association for Information Systems 39 (1), 14, 2016 | 8 | 2016 |
Predicting IT job satisfaction: occupational congruence and the job characteristics model D Carpenter, DK Young, M Maasberg, A McLeod | 7 | 2017 |
A Conceptual Replication of the Unified Model of Information Security Policy Compliance DK Young, D Carpenter, A McLeod AIS Transactions on Replication Research 6, 2020 | 5 | 2020 |
Re-examining the information systems security problem from a systems theory perspective DK Young, WA Conklin, G Dietrich | 3 | 2010 |
Project-method fit: Exploring factors that influence agile method use DK Young The University of Texas at San Antonio, 2013 | 2 | 2013 |
How Social Media Analytics Can Inform Social Content Strategies: Evidence from Healthcare Sector N Kordzadeh, DK Young | | 2018 |
Framing Information Security Budget Requests to Maximize Investments NL Beebe, DK Young, FR Chang College of Business, University of Texas at San Antonio Working Papers, 2013 | | 2013 |
Framing Information Security Budget Requests to Maximize Investments DK YOUNG | | 2013 |