Identification of fraudulent financial statements using linguistic credibility analysis SL Humpherys, KC Moffitt, MB Burns, JK Burgoon, WF Felix Decision Support Systems 50 (3), 585-594, 2011 | 430 | 2011 |
Automated deception detection of 911 call transcripts MB Burns, KC Moffitt Security Informatics 3, 1-9, 2014 | 50 | 2014 |
“Alexa, write an audit opinion”: Adopting intelligent virtual assistants in accounting workplaces MB Burns, A Igou Journal of Emerging Technologies in Accounting 16 (1), 81-92, 2019 | 45 | 2019 |
What does that mean? Investigating obfuscation and readability cues as indicators of deception in fraudulent financial reports K Moffitt, MB Burns AMCIS 2009 Proceedings, 399, 2009 | 43 | 2009 |
Preparing for the robots: A proposed course in robotic process automation NE Vincent, A Igou, MB Burns Journal of Emerging Technologies in Accounting 17 (2), 75-91, 2020 | 29 | 2020 |
Forget the fluff: Examining how media richness influences the impact of information security training on secure behavior JL Jenkins, A Durcikova, MB Burns 2012 45th Hawaii International Conference on System Sciences, 3288-3296, 2012 | 29 | 2012 |
What kind of interventions can help users from falling for phishing attempts: A research proposal for examining stage-appropriate interventions MB Burns, A Durcikova, JL Jenkins 2013 46th Hawaii International Conference on System Sciences, 4023-4032, 2013 | 23 | 2013 |
A theoretical justification for using embodied conversational agents (ECAs) to augment accounting-related interviews MD Pickard, MB Burns, KC Moffitt Journal of Information Systems 27 (2), 159-176, 2013 | 22 | 2013 |
A scale assessing team-based job performance in a customer-oriented environment KN Kennedy, FG Lassk, MB Burns Journal of Quality Management 6 (2), 257-273, 2001 | 21 | 2001 |
Simplicity is bliss: Controlling extraneous cognitive load in online security training to promote secure behavior JL Jenkins, A Durcikova, MB Burns Journal of Organizational and End User Computing (JOEUC) 25 (3), 52-66, 2013 | 19 | 2013 |
State of content: Healthcare executive’s role in information technology adoption N Hikmet, S Banerjee, MB Burns Scientific Research Publishing, 2012 | 18 | 2012 |
Organizational citizenship behavior in the IS context: A research agenda MB Burns, RW Collins | 16 | 1995 |
Get a cue on is Security Training: Explaining the Difference between how Security Cues and Security Arguments Improve Secure Behavior J Jenkins, A Durcikova, M Burns | 11 | 2011 |
On not falling for phish: Examining multiple stages of protective behavior of information system end-users MB Burns, A Durcikova, JL Jenkins | 9 | 2012 |
Understanding persistence of risky IS behavior with respect to phishing: A multi-stage approach MB Burns, A Durcikova, JL Jenkins The 2011 Dewald Roode Workshop on Information Systems Security Research, 2011 | 4 | 2011 |
Organizational citizenship in the context: A research agenda M Burns, RW Collins http//hsbBaybr. edu. htm, 2000 | 4 | 2000 |
Health care executives: The association between external factors, use, and their perceptions of health information technology N Hikmet, M Burns AMCIS 2004 Proceedings, 33, 2004 | 3 | 2004 |
Transference of power: shifting expertise to expert system developers F Belanger, MB Burns, RP Will Proceedings the 11th Conference on Artificial Intelligence for Applications …, 1995 | 3 | 1995 |
Examining Multiple Stages of Protective Behavior of Information System End-Users MB Burns The University of Arizona., 2012 | 1 | 2012 |
Facial thermal imaging as a technique for deception detection K Moffitt, M Burns, J Jenkins, JK Burgoon, JF Nunamaker Proceedings of the 43rd Hawaii International Conference on System Sciences …, 2010 | 1 | 2010 |