Mary B. Burns
Zitiert von
Zitiert von
Identification of fraudulent financial statements using linguistic credibility analysis
SL Humpherys, KC Moffitt, MB Burns, JK Burgoon, WF Felix
Decision Support Systems 50 (3), 585-594, 2011
What does that mean? Investigating obfuscation and readability cues as indicators of deception in fraudulent financial reports
K Moffitt, MB Burns
AMCIS 2009 Proceedings, 399, 2009
Forget the fluff: Examining how media richness influences the impact of information security training on secure behavior
JL Jenkins, A Durcikova, MB Burns
2012 45th Hawaii International Conference on System Sciences, 3288-3296, 2012
Automated deception detection of 911 call transcripts
MB Burns, KC Moffitt
Security Informatics 3 (1), 8, 2014
A theoretical justification for using embodied conversational agents (ECAs) to augment accounting-related interviews
MD Pickard, MB Burns, KC Moffitt
Journal of Information Systems 27 (2), 159-176, 2013
State of content: Healthcare executive’s role in information technology adoption
N Hikmet, S Banerjee, MB Burns
Scientific Research Publishing, 2012
What kind of interventions can help users from falling for phishing attempts: A research proposal for examining stage-appropriate interventions
MB Burns, A Durcikova, JL Jenkins
2013 46th Hawaii International Conference on System Sciences, 4023-4032, 2013
A scale assessing team-based job performance in a customer-oriented environment
KN Kennedy, FG Lassk, MB Burns
Journal of Quality Management 6 (2), 257-273, 2001
Organizational citizenship behavior in the IS context: A research agenda
MB Burns, RW Collins
Proceedings of the 16th Americas Conference on Information Systems, 25-27, 1995
Get a cue on is Security Training: Explaining the Difference between how Security Cues and Security Arguments Improve Secure Behavior
J Jenkins, A Durcikova, M Burns
Simplicity is bliss: Controlling extraneous cognitive load in online security training to promote secure behavior
JL Jenkins, A Durcikova, MB Burns
Journal of Organizational and End User Computing (JOEUC) 25 (3), 52-66, 2013
On not falling for phish: Examining multiple stages of protective behavior of information system end-users
MB Burns, A Durcikova, JL Jenkins
Organizational citizenship in the context: A research agenda
M Burns, RW Collins
http//hsbBaybr. edu. htm, 2000
“Alexa, write an audit opinion”: Adopting intelligent virtual assistants in accounting workplaces
MB Burns, A Igou
Journal of Emerging Technologies in Accounting 16 (1), 81-92, 2019
Understanding Persistence of Risky IS Behavior with Respect to Phishing: A Multi-stage Approach
MB Burns, A Durcikova, JL Jenkins
The 2011 Dewald Roode Workshop on Information Systems Security Research, 2011
Health Care Executives: The Association between External Factors, Use, and Their Perceptions of Health Information Technology
N Hikmet, M Burns
AMCIS 2004 Proceedings, 33, 2004
Transference of power: shifting expertise to expert system developers
F Belanger, MB Burns, RP Will
Proceedings the 11th Conference on Artificial Intelligence for Applications …, 1995
Examining Multiple Stages of Protective Behavior of Information System End-Users
MB Burns
The University of Arizona., 2012
Facial thermal imaging as a technique for deception detection
K Moffitt, M Burns, J Jenkins, JK Burgoon, JF Nunamaker
Proceedings of the 43rd Hawaii International Conference on System Sciences …, 2010
The Effect of Embodied Agents on Users' Behavior.
MD Pickard, RG Brody, MB Burns
Insights to a Changing World Journal 2013 (1), 2013
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20