Folgen
Jeffrey D Wall
Jeffrey D Wall
Associate Professor, College of Business, Michigan Technological University
Bestätigte E-Mail-Adresse bei mtu.edu - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Critical Discourse Analysis as a Review Methodology: An Empirical Example
JD Wall, BC Stahl, AF Salam
Communications of the Association for Information Systems 37 (1), 257 – 285, 2015
1132015
Organizational Violations of Externally Governed Privacy and Security Rules: Explaining and Predicting Selective Violations Under Conditions of Strain and Excess
JD Wall, PB Lowry, JB Barlow
Journal of the Association for Information Systems 17 (1), 39-76, 2016
992016
Control-related motivations and information security policy compliance: The role of autonomy and efficacy
JD Wall, P Palvia, PB Lowry
Journal of Information Privacy and Security 9 (4), 52-79, 2013
942013
Perceived argument quality's effect on threat and coping appraisals in fear appeals: An experiment and exploration of realism check heuristics
JD Wall, M Warkentin
Information & Management, 2019
562019
To Fear or Not to Fear? A Critical Review and Analysis of Fear Appeals in the Information Security Context
JD Wall, MW Buche
Communications of the Association for Information Systems 41 (1), 13, 2017
532017
Privacy Coping and Information-Sharing Behaviors in Social Media: A Comparison of Chinese and US Users
H Nemati, JD Wall, A Chow
Journal of Global Information Technology Management 17 (4), 228-249, 2014
242014
Theorizing the Behavioral Effects of Control Complementarity in Security Control Portfolios
JD Wall, P Palvia, J D’Arcy
Information Systems Frontiers, 1-22, 2021
16*2021
Proposing the core contributor withdrawal theory (CCWT) to understand core contributor withdrawal from online peer-production communities
L Jiang, K Mirkovski, JD Wall, C Wagner, P Lowry
Internet Research 28 (4), 988-1028, 2018
142018
Learning Computing Topics in Undergraduate Information Systems Courses: Managing Perceived Difficulty
JD Wall, J Knapp
Journal of Information Systems Education 25 (3), 245-259, 2015
102015
Control-related motivations and information security policy compliance: The effect of reflective and reactive autonomy
JD Wall, P Palvia
AMCIS, 2013
92013
Understanding employees' information security identities: an interpretive narrative approach
JD Wall, P Palvia
Information Technology & People, 2022
72022
The dark side of leadership in information systems security: A model of the effect of manager transgressions on employee security behaviors
J Wall, L Iyer
72012
The Organization Man and the Innovator: Theoretical Archetypes to Inform Behavioral Information Security Research
JD Wall, R Singh
The DATABASE for Advances in Information Systems 49 (1), 67-80, 2018
52018
Conceptualizing employee compliance and noncompliance in information security research: A review and research agenda
JD Wall, I Lakshmi, AF Salam, M Siponen
Proceedings of the 2013 Dewald Roode Information Security Workshop, 2013
4*2013
Contextualized Meaning Extraction: A Meta-Algorithm for Big Data Text Mining with Pragmatics
JD Wall, R Singh
International Journal of Organizational and Collective Intelligence (IJOCI …, 2017
32017
Theorizing a Low Entry-Cost, Interdisciplinary Undergraduate Curriculum for Open Source Project-Based Learning
JD Wall
Midwest Association for Information Systems Conference, 2023
2023
Modular and Collaborative Theorizing: A Move Away from Theoretical Superstars
JD Wall
2019
Integrating Outcome Oriented Policy in Information Security Policies: An Examination of Security Perceptions, Motivations, and Intentions
MW Buche, JD Wall
2017
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–18