BibTeX records: Merrill Warkentin

download as .bib file

@article{DBLP:journals/cais/OtondoCW18,
  author    = {Robert F. Otondo and
               Robert E. Crossler and
               Merrill Warkentin},
  title     = {Ranking Factors by Importance in Factorial Survey Analysis},
  journal   = {{CAIS}},
  volume    = {42},
  pages     = {8},
  year      = {2018},
  url       = {http://aisel.aisnet.org/cais/vol42/iss1/8},
  timestamp = {Tue, 17 Apr 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/cais/OtondoCW18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MenardWL18,
  author    = {Philip Menard and
               Merrill Warkentin and
               Paul Benjamin Lowry},
  title     = {The impact of collectivism and psychological ownership on protection
               motivation: {A} cross-cultural examination},
  journal   = {Computers {\&} Security},
  volume    = {75},
  pages     = {147--166},
  year      = {2018},
  url       = {https://doi.org/10.1016/j.cose.2018.01.020},
  doi       = {10.1016/j.cose.2018.01.020},
  timestamp = {Wed, 25 Apr 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/compsec/MenardWL18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isj/WillisonWJ18,
  author    = {Robert Willison and
               Merrill Warkentin and
               Allen C. Johnston},
  title     = {Examining employee computer abuse intentions: insights from justice,
               deterrence and neutralization perspectives},
  journal   = {Inf. Syst. J.},
  volume    = {28},
  number    = {2},
  pages     = {266--293},
  year      = {2018},
  url       = {https://doi.org/10.1111/isj.12129},
  doi       = {10.1111/isj.12129},
  timestamp = {Tue, 20 Feb 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/isj/WillisonWJ18},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dsj/ZhangLLW17,
  author    = {Jie Zhang and
               Han Li and
               Xin (Robert) Luo and
               Merrill Warkentin},
  title     = {Exploring the Effects of the Privacy-Handling Management Styles of
               Social Networking Sites on User Satisfaction: {A} Conflict Management
               Perspective},
  journal   = {Decision Sciences},
  volume    = {48},
  number    = {5},
  pages     = {956--989},
  year      = {2017},
  url       = {https://doi.org/10.1111/deci.12243},
  doi       = {10.1111/deci.12243},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/dsj/ZhangLLW17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iam/WallaceJW17,
  author    = {Linda G. Wallace and
               Tabitha L. James and
               Merrill Warkentin},
  title     = {How do you feel about your friends? Understanding situational envy
               in online social networks},
  journal   = {Information {\&} Management},
  volume    = {54},
  number    = {5},
  pages     = {669--682},
  year      = {2017},
  url       = {https://doi.org/10.1016/j.im.2016.12.010},
  doi       = {10.1016/j.im.2016.12.010},
  timestamp = {Wed, 28 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iam/WallaceJW17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iam/JamesWWKC17,
  author    = {Tabitha L. James and
               Linda G. Wallace and
               Merrill Warkentin and
               Byung Cho Kim and
               St{\'{e}}phane E. Collignon},
  title     = {Exposing others' information on online social networks (OSNs): Perceived
               shared risk, its determinants, and its influence on {OSN} privacy
               control use},
  journal   = {Information {\&} Management},
  volume    = {54},
  number    = {7},
  pages     = {851--865},
  year      = {2017},
  url       = {https://doi.org/10.1016/j.im.2017.01.001},
  doi       = {10.1016/j.im.2017.01.001},
  timestamp = {Mon, 06 Nov 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/iam/JamesWWKC17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipm/HoLWYH17,
  author    = {Shuyuan Mary Ho and
               Paul Benjamin Lowry and
               Merrill Warkentin and
               Yanyun Yang and
               Jonathan M. Hollister},
  title     = {Gender deception in asynchronous online communication: {A} path analysis},
  journal   = {Inf. Process. Manage.},
  volume    = {53},
  number    = {1},
  pages     = {21--41},
  year      = {2017},
  url       = {https://doi.org/10.1016/j.ipm.2016.06.004},
  doi       = {10.1016/j.ipm.2016.06.004},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ipm/HoLWYH17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isf/HoW17,
  author    = {Shuyuan Mary Ho and
               Merrill Warkentin},
  title     = {Leader's dilemma game: An experimental design for cyber insider threat
               research},
  journal   = {Information Systems Frontiers},
  volume    = {19},
  number    = {2},
  pages     = {377--396},
  year      = {2017},
  url       = {https://doi.org/10.1007/s10796-015-9599-5},
  doi       = {10.1007/s10796-015-9599-5},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/isf/HoW17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jais/WarkentinGM17,
  author    = {Merrill Warkentin and
               Sanjay Goel and
               Philip Menard},
  title     = {Shared Benefits and Information Privacy: What Determines Smart Meter
               Technology Adoption?},
  journal   = {J. {AIS}},
  volume    = {18},
  number    = {11},
  pages     = {3},
  year      = {2017},
  url       = {http://aisel.aisnet.org/jais/vol18/iss11/3},
  timestamp = {Tue, 19 Dec 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/jais/WarkentinGM17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmis/JamesLWW17,
  author    = {Tabitha L. James and
               Paul Benjamin Lowry and
               Linda G. Wallace and
               Merrill Warkentin},
  title     = {The Effect of Belongingness on Obsessive-Compulsive Disorder in the
               Use of Online Social Networks},
  journal   = {J. of Management Information Systems},
  volume    = {34},
  number    = {2},
  pages     = {560--596},
  year      = {2017},
  url       = {http://www.jmis-web.org/articles/1342},
  timestamp = {Fri, 22 Sep 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jmis/JamesLWW17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/DincelliGW17,
  author    = {Ersin Dincelli and
               Sanjay Goel and
               Merrill Warkentin},
  title     = {Understanding Nuances of Privacy and Security in the Context of Information
               Systems},
  booktitle = {23rd Americas Conference on Information Systems, {AMCIS} 2017, Boston,
               MA, USA, August 10-12, 2017},
  year      = {2017},
  crossref  = {DBLP:conf/amcis/2017},
  url       = {http://aisel.aisnet.org/amcis2017/InformationSystems/Presentations/39},
  timestamp = {Tue, 23 May 2017 14:16:12 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/amcis/DincelliGW17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/VedadiW17,
  author    = {Ali Vedadi and
               Merrill Warkentin},
  title     = {Developing Measurement Scales for Passwords Uniqueness and Secrecy},
  booktitle = {23rd Americas Conference on Information Systems, {AMCIS} 2017, Boston,
               MA, USA, August 10-12, 2017},
  year      = {2017},
  crossref  = {DBLP:conf/amcis/2017},
  url       = {http://aisel.aisnet.org/amcis2017/InformationSystems/Presentations/4},
  timestamp = {Tue, 23 May 2017 14:16:12 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/amcis/VedadiW17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/WarkentinJV17,
  author    = {Merrill Warkentin and
               Allen C. Johnston and
               Anthony Vance},
  title     = {Introduction to Innovative Behavioral {IS} Security and Privacy Research
               Minitrack},
  booktitle = {50th Hawaii International Conference on System Sciences, {HICSS} 2017,
               Hilton Waikoloa Village, Hawaii, USA, January 4-7, 2017},
  year      = {2017},
  crossref  = {DBLP:conf/hicss/2017},
  url       = {http://aisel.aisnet.org/hicss-50/in/behavioral_is_security/1},
  timestamp = {Fri, 10 Mar 2017 15:07:22 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/hicss/WarkentinJV17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nspw/RenaudW17,
  author    = {Karen Renaud and
               Merrill Warkentin},
  title     = {Risk Homeostasis in Information Security: Challenges in Confirming
               Existence and Verifying Impact},
  booktitle = {Proceedings of the 2017 New Security Paradigms Workshop, {NSPW} 2017,
               Santa Cruz, CA, USA, October 01-04, 2017},
  pages     = {57--69},
  year      = {2017},
  crossref  = {DBLP:conf/nspw/2017},
  url       = {http://doi.acm.org/10.1145/3171533.3171534},
  doi       = {10.1145/3171533.3171534},
  timestamp = {Mon, 05 Mar 2018 20:42:48 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/nspw/RenaudW17},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cais/LeeWJ16,
  author    = {James Lee and
               Merrill Warkentin and
               Allen C. Johnston},
  title     = {A Broader View of Perceived Risk during Internet Transactions},
  journal   = {{CAIS}},
  volume    = {38},
  pages     = {8},
  year      = {2016},
  url       = {http://aisel.aisnet.org/cais/vol38/iss1/8},
  timestamp = {Thu, 17 Nov 2016 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/cais/LeeWJ16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dss/WarkentinJSB16,
  author    = {Merrill Warkentin and
               Allen C. Johnston and
               Jordan Shropshire and
               William D. Barnett},
  title     = {Continuance of protective security behavior: {A} longitudinal study},
  journal   = {Decision Support Systems},
  volume    = {92},
  pages     = {25--35},
  year      = {2016},
  url       = {https://doi.org/10.1016/j.dss.2016.09.013},
  doi       = {10.1016/j.dss.2016.09.013},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/dss/WarkentinJSB16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejis/JohnstonWMC16,
  author    = {Allen C. Johnston and
               Merrill Warkentin and
               Maranda E. McBride and
               Lemuria Carter},
  title     = {Dispositional and situational factors: influences on information security
               policy violations},
  journal   = {{EJIS}},
  volume    = {25},
  number    = {3},
  pages     = {231--251},
  year      = {2016},
  url       = {https://doi.org/10.1057/ejis.2015.15},
  doi       = {10.1057/ejis.2015.15},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ejis/JohnstonWMC16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/itm/JamesNCWZ16,
  author    = {Tabitha L. James and
               Quinton Nottingham and
               St{\'{e}}phane E. Collignon and
               Merrill Warkentin and
               Jennifer L. Ziegelmayer},
  title     = {The interpersonal privacy identity {(IPI):} development of a privacy
               as control model},
  journal   = {Information Technology and Management},
  volume    = {17},
  number    = {4},
  pages     = {341--360},
  year      = {2016},
  url       = {https://doi.org/10.1007/s10799-015-0246-0},
  doi       = {10.1007/s10799-015-0246-0},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/itm/JamesNCWZ16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jais/WarkentinWJS16,
  author    = {Merrill Warkentin and
               Eric Walden and
               Allen C. Johnston and
               Detmar W. Straub},
  title     = {Neural Correlates of Protection Motivation for Secure {IT} Behaviors:
               An fMRI Examination},
  journal   = {J. {AIS}},
  volume    = {17},
  number    = {3},
  pages     = {1},
  year      = {2016},
  url       = {http://aisel.aisnet.org/jais/vol17/iss3/1},
  timestamp = {Thu, 17 Nov 2016 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/jais/WarkentinWJS16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/WarkentinVJ16,
  author    = {Merrill Warkentin and
               Anthony Vance and
               Allen C. Johnston},
  title     = {Introduction to the Minitrack on Innovative Behavioral {IS} Security
               and Privacy Research},
  booktitle = {49th Hawaii International Conference on System Sciences, {HICSS} 2016,
               Koloa, HI, USA, January 5-8, 2016},
  pages     = {3635},
  year      = {2016},
  crossref  = {DBLP:conf/hicss/2016},
  url       = {https://doi.org/10.1109/HICSS.2016.454},
  doi       = {10.1109/HICSS.2016.454},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/hicss/WarkentinVJ16},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/ShropshireWS15,
  author    = {Jordan Shropshire and
               Merrill Warkentin and
               Shwadhin Sharma},
  title     = {Personality, attitudes, and intentions: Predicting initial adoption
               of information security behavior},
  journal   = {Computers {\&} Security},
  volume    = {49},
  pages     = {177--191},
  year      = {2015},
  url       = {https://doi.org/10.1016/j.cose.2015.01.002},
  doi       = {10.1016/j.cose.2015.01.002},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/compsec/ShropshireWS15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejis/WarkentinCC15,
  author    = {Merrill Warkentin and
               Brigitte Charles{-}Pauvers and
               Patrick Y. K. Chau},
  title     = {Cross-cultural {IS} research: perspectives from Eastern and Western
               traditions},
  journal   = {{EJIS}},
  volume    = {24},
  number    = {3},
  pages     = {229--233},
  year      = {2015},
  url       = {https://doi.org/10.1057/ejis.2015.7},
  doi       = {10.1057/ejis.2015.7},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ejis/WarkentinCC15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iam/LuoLXWS15,
  author    = {Chuan Luo and
               Xin (Robert) Luo and
               Yun Xu and
               Merrill Warkentin and
               Choon{-}Ling Sia},
  title     = {Examining the moderating role of sense of membership in online review
               evaluations},
  journal   = {Information {\&} Management},
  volume    = {52},
  number    = {3},
  pages     = {305--316},
  year      = {2015},
  url       = {https://doi.org/10.1016/j.im.2014.12.008},
  doi       = {10.1016/j.im.2014.12.008},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iam/LuoLXWS15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iam/JamesWC15,
  author    = {Tabitha L. James and
               Merrill Warkentin and
               St{\'{e}}phane E. Collignon},
  title     = {A dual privacy decision model for online social networks},
  journal   = {Information {\&} Management},
  volume    = {52},
  number    = {8},
  pages     = {893--908},
  year      = {2015},
  url       = {https://doi.org/10.1016/j.im.2015.07.010},
  doi       = {10.1016/j.im.2015.07.010},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/iam/JamesWC15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/misq/JohnstonWS15,
  author    = {Allen C. Johnston and
               Merrill Warkentin and
               Mikko T. Siponen},
  title     = {An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to
               the Human Asset Through Sanctioning Rhetoric},
  journal   = {{MIS} Quarterly},
  volume    = {39},
  number    = {1},
  pages     = {113--134},
  year      = {2015},
  url       = {http://misq.org/an-enhanced-fear-appeal-rhetorical-framework-leveraging-threats-to-the-human-asset-through-sanctioning-rhetoric.html},
  timestamp = {Wed, 25 Feb 2015 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/misq/JohnstonWS15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/WarkentinJV15,
  author    = {Merrill Warkentin and
               Allen C. Johnston and
               Anthony Vance},
  title     = {Introduction to the Innovative Behavioral {IS} Security and Privacy
               Research Minitrack},
  booktitle = {48th Hawaii International Conference on System Sciences, {HICSS} 2015,
               Kauai, Hawaii, USA, January 5-8, 2015},
  pages     = {3452},
  year      = {2015},
  crossref  = {DBLP:conf/hicss/2015},
  url       = {https://doi.org/10.1109/HICSS.2015.415},
  doi       = {10.1109/HICSS.2015.415},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/hicss/WarkentinJV15},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hicss/WarkentinJV14,
  author    = {Merrill Warkentin and
               Allen C. Johnston and
               Anthony Vance},
  title     = {Introduction to Innovative Behavioral {IS} Security and Privacy Research
               Minitrack},
  booktitle = {47th Hawaii International Conference on System Sciences, {HICSS} 2014,
               Waikoloa, HI, USA, January 6-9, 2014},
  pages     = {3148},
  year      = {2014},
  crossref  = {DBLP:conf/hicss/2014},
  url       = {https://doi.org/10.1109/HICSS.2014.390},
  doi       = {10.1109/HICSS.2014.390},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/hicss/WarkentinJV14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/crc/chb/WarkentinM14,
  author    = {Merrill Warkentin and
               Leigh A. Mutchler},
  title     = {Behavioral Information Security Management},
  booktitle = {Computing Handbook, Third Edition: Information Systems and Information
               Technology},
  pages     = {54: 1--20},
  year      = {2014},
  crossref  = {DBLP:books/crc/chb2014-2},
  timestamp = {Tue, 17 Jun 2014 13:41:03 +0200},
  biburl    = {https://dblp.org/rec/bib/books/crc/chb/WarkentinM14},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/CrosslerJLHWB13,
  author    = {Robert E. Crossler and
               Allen C. Johnston and
               Paul Benjamin Lowry and
               Qing Hu and
               Merrill Warkentin and
               Richard Baskerville},
  title     = {Future directions for behavioral information security research},
  journal   = {Computers {\&} Security},
  volume    = {32},
  pages     = {90--101},
  year      = {2013},
  url       = {https://doi.org/10.1016/j.cose.2012.09.010},
  doi       = {10.1016/j.cose.2012.09.010},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/compsec/CrosslerJLHWB13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/BarlowWOD13,
  author    = {Jordan B. Barlow and
               Merrill Warkentin and
               Dustin Ormond and
               Alan R. Dennis},
  title     = {Don't make excuses! Discouraging neutralization to reduce {IT} policy
               violation},
  journal   = {Computers {\&} Security},
  volume    = {39},
  pages     = {145--159},
  year      = {2013},
  url       = {https://doi.org/10.1016/j.cose.2013.05.006},
  doi       = {10.1016/j.cose.2013.05.006},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/compsec/BarlowWOD13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/misq/WillisonW13,
  author    = {Robert Willison and
               Merrill Warkentin},
  title     = {Beyond Deterrence: An Expanded View of Employee Computer Abuse},
  journal   = {{MIS} Quarterly},
  volume    = {37},
  number    = {1},
  pages     = {1--20},
  year      = {2013},
  url       = {http://misq.org/beyond-deterrence-an-expanded-view-of-employee-computer-abuse.html},
  timestamp = {Wed, 25 Feb 2015 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/misq/WillisonW13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icis/LeeCW13,
  author    = {James Lee and
               Robert E. Crossler and
               Merrill Warkentin},
  title     = {Implications of Monitoring Mechanisms on Bring Your Own Device {(BYOD)}
               Adoption},
  booktitle = {Proceedings of the International Conference on Information Systems,
               {ICIS} 2013, Milano, Italy, December 15-18, 2013},
  year      = {2013},
  crossref  = {DBLP:conf/icis/2013},
  url       = {http://aisel.aisnet.org/icis2013/proceedings/ResearchInProgress/23},
  timestamp = {Tue, 08 Apr 2014 15:06:58 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icis/LeeCW13},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cais/PopeWML12,
  author    = {Michael Brian Pope and
               Merrill Warkentin and
               Leigh A. Mutchler and
               Xin (Robert) Luo},
  title     = {The Domain Name System - Past, Present, and Future},
  journal   = {{CAIS}},
  volume    = {30},
  pages     = {21},
  year      = {2012},
  url       = {http://aisel.aisnet.org/cais/vol30/iss1/21},
  timestamp = {Sat, 19 Nov 2016 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/cais/PopeWML12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cais/PopeWBS12,
  author    = {Michael Brian Pope and
               Merrill Warkentin and
               Ernst Bekkering and
               Mark B. Schmidt},
  title     = {Digital Steganography - An Introduction to Techniques and Tools},
  journal   = {{CAIS}},
  volume    = {30},
  pages     = {22},
  year      = {2012},
  url       = {http://aisel.aisnet.org/cais/vol30/iss1/22},
  timestamp = {Sat, 19 Nov 2016 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/cais/PopeWBS12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eswa/WarkentinSS12,
  author    = {Merrill Warkentin and
               Vijayan Sugumaran and
               Robert Sainsbury},
  title     = {The role of intelligent agents and data mining in electronic partnership
               management},
  journal   = {Expert Syst. Appl.},
  volume    = {39},
  number    = {18},
  pages     = {13277--13288},
  year      = {2012},
  url       = {https://doi.org/10.1016/j.eswa.2012.05.074},
  doi       = {10.1016/j.eswa.2012.05.074},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/eswa/WarkentinSS12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijwnbt/PopeWL12,
  author    = {Michael Brian Pope and
               Merrill Warkentin and
               Xin (Robert) Luo},
  title     = {Evolutionary Malware: Mobile Malware, Botnets, and Malware Toolkits},
  journal   = {{IJWNBT}},
  volume    = {2},
  number    = {3},
  pages     = {52--60},
  year      = {2012},
  url       = {https://doi.org/10.4018/ijwnbt.2012070105},
  doi       = {10.4018/ijwnbt.2012070105},
  timestamp = {Sun, 28 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ijwnbt/PopeWL12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/WarkentinM12,
  author    = {Merrill Warkentin and
               Nirmalee Malimage},
  title     = {Overcoming Mixed-Gender Requirements Misspecification with the Modified
               Coherence Method},
  booktitle = {18th Americas Conference on Information Systems, {AMCIS} 2012, Seattle,
               Washington August 9-11, 2012},
  year      = {2012},
  crossref  = {DBLP:conf/amcis/2012},
  url       = {http://aisel.aisnet.org/amcis2012/proceedings/SystemsAnalysis/7},
  timestamp = {Tue, 29 Jan 2013 17:22:17 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/amcis/WarkentinM12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/WarkentinMCJ12,
  author    = {Merrill Warkentin and
               Maranda E. McBride and
               Lemuria Carter and
               Allen C. Johnston},
  title     = {The Role of Individual Characteristics on Insider Abuse Intentions},
  booktitle = {18th Americas Conference on Information Systems, {AMCIS} 2012, Seattle,
               Washington August 9-11, 2012},
  year      = {2012},
  crossref  = {DBLP:conf/amcis/2012},
  url       = {http://aisel.aisnet.org/amcis2012/proceedings/ISSecurity/28},
  timestamp = {Tue, 29 Jan 2013 17:22:17 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/amcis/WarkentinMCJ12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/WarkentinSGPR12,
  author    = {Merrill Warkentin and
               Shwadhin Sharma and
               David Gefen and
               Paul A. Pavlou and
               Gregory M. Rose},
  title     = {Government of the People, By the People: {A} Look at Trust in eGovernment},
  booktitle = {18th Americas Conference on Information Systems, {AMCIS} 2012, Seattle,
               Washington August 9-11, 2012},
  year      = {2012},
  crossref  = {DBLP:conf/amcis/2012},
  url       = {http://aisel.aisnet.org/amcis2012/proceedings/EGovernment/20},
  timestamp = {Tue, 29 Jan 2013 17:22:17 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/amcis/WarkentinSGPR12},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejis/LiGLW11,
  author    = {Han Li and
               Ashish Gupta and
               Xin (Robert) Luo and
               Merrill Warkentin},
  title     = {Exploring the impact of instant messaging on subjective task complexity
               and user satisfaction},
  journal   = {{EJIS}},
  volume    = {20},
  number    = {2},
  pages     = {139--155},
  year      = {2011},
  url       = {https://doi.org/10.1057/ejis.2010.59},
  doi       = {10.1057/ejis.2010.59},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ejis/LiGLW11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejis/WarkentinJS11,
  author    = {Merrill Warkentin and
               Allen C. Johnston and
               Jordan Shropshire},
  title     = {The influence of the informal social learning environment on information
               privacy policy compliance efficacy and intention},
  journal   = {{EJIS}},
  volume    = {20},
  number    = {3},
  pages     = {267--284},
  year      = {2011},
  url       = {https://doi.org/10.1057/ejis.2010.72},
  doi       = {10.1057/ejis.2010.72},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ejis/WarkentinJS11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/WarkentinWJ11,
  author    = {Merrill Warkentin and
               Robert Willison and
               Allen C. Johnston},
  title     = {The Role of Perceptions of Organizational Injustice and Techniques
               of Neutralization in Forming Computer Abuse Intentions},
  booktitle = {A Renaissance of Information Technology for Sustainability and Global
               Competitiveness. 17th Americas Conference on Information Systems,
               {AMCIS} 2011, Detroit, Michigan, USA, August 4-8 2011},
  year      = {2011},
  crossref  = {DBLP:conf/amcis/2011},
  url       = {http://aisel.aisnet.org/amcis2011_submissions/318},
  timestamp = {Tue, 03 Jan 2012 09:17:07 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/amcis/WarkentinWJ11},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joeuc/JohnstonW10,
  author    = {Allen C. Johnston and
               Merrill Warkentin},
  title     = {The Influence of Perceived Source Credibility on End User Attitudes
               and Intentions to Comply with Recommended {IT} Actions},
  journal   = {{JOEUC}},
  volume    = {22},
  number    = {3},
  pages     = {1--21},
  year      = {2010},
  url       = {https://doi.org/10.4018/joeuc.2010070101},
  doi       = {10.4018/joeuc.2010070101},
  timestamp = {Wed, 17 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/joeuc/JohnstonW10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/misq/JohnstonW10,
  author    = {Allen C. Johnston and
               Merrill Warkentin},
  title     = {Fear Appeals and Information Security Behaviors: An Empirical Study},
  journal   = {{MIS} Quarterly},
  volume    = {34},
  number    = {3},
  pages     = {549--566},
  year      = {2010},
  url       = {http://misq.org/fear-appeals-and-information-security-behaviors-an-empirical-study.html},
  timestamp = {Fri, 11 Feb 2011 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/misq/JohnstonW10},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/db/WarkentinMBJ09,
  author    = {Merrill Warkentin and
               Robert S. Moore and
               Ernst Bekkering and
               Allen C. Johnston},
  title     = {Analysis of systems development project risks: an integrative framework},
  journal   = {{DATA} {BASE}},
  volume    = {40},
  number    = {2},
  pages     = {8--27},
  year      = {2009},
  url       = {http://doi.acm.org/10.1145/1531817.1531821},
  doi       = {10.1145/1531817.1531821},
  timestamp = {Wed, 19 Sep 2012 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/db/WarkentinMBJ09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejis/WarkentinW09,
  author    = {Merrill Warkentin and
               Robert Willison},
  title     = {Behavioral and policy issues in information systems security: the
               insider threat},
  journal   = {{EJIS}},
  volume    = {18},
  number    = {2},
  pages     = {101--105},
  year      = {2009},
  url       = {https://doi.org/10.1057/ejis.2009.12},
  doi       = {10.1057/ejis.2009.12},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ejis/WarkentinW09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/irmj/BekkeringJWS09,
  author    = {Ernst Bekkering and
               Allen C. Johnston and
               Merrill Warkentin and
               Mark B. Schmidt},
  title     = {An Empirical Assessment of Technology Adoption as a Choice between
               Alternatives},
  journal   = {{IRMJ}},
  volume    = {22},
  number    = {4},
  pages     = {23--44},
  year      = {2009},
  url       = {https://doi.org/10.4018/irmj.2009061902},
  doi       = {10.4018/irmj.2009061902},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/irmj/BekkeringJWS09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/LuoWJ09,
  author    = {Xin (Robert) Luo and
               Merrill Warkentin and
               Allen C. Johnston},
  title     = {The Impact of National Culture on Workplace Privacy Expectations in
               the Context of Information Security Assurance},
  booktitle = {Proceedings of the 15th Americas Conference on Information Systems,
               {AMCIS} 2009, San Francisco, California, USA, August 6-9, 2009},
  pages     = {521},
  year      = {2009},
  crossref  = {DBLP:conf/amcis/2009},
  url       = {http://aisel.aisnet.org/amcis2009/521},
  timestamp = {Mon, 19 Nov 2012 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/amcis/LuoWJ09},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imcs/JohnstonW08,
  author    = {Allen C. Johnston and
               Merrill Warkentin},
  title     = {Information privacy compliance in the healthcare industry},
  journal   = {Inf. Manag. Comput. Security},
  volume    = {16},
  number    = {1},
  pages     = {5--19},
  year      = {2008},
  url       = {https://doi.org/10.1108/09685220810862715},
  doi       = {10.1108/09685220810862715},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/imcs/JohnstonW08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdfsl/WarkentinBS08,
  author    = {Merrill Warkentin and
               Ernst Bekkering and
               Mark B. Schmidt},
  title     = {Steganography: Forensic, Security, and Legal Issues},
  journal   = {{JDFSL}},
  volume    = {3},
  number    = {2},
  pages     = {17--34},
  year      = {2008},
  url       = {http://ojs.jdfsl.org/index.php/jdfsl/article/view/179},
  timestamp = {Thu, 31 Jul 2014 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jdfsl/WarkentinBS08},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/WarkentinBJM07,
  author    = {Merrill Warkentin and
               Ernst Bekkering and
               Allen C. Johnston and
               Robert S. Moore},
  title     = {Risk Perspectives in Systems Development},
  booktitle = {Reaching New Heights. 13th Americas Conference on Information Systems,
               {AMCIS} 2007, Keystone, Colorado, USA, August 9-12, 2007},
  pages     = {273},
  year      = {2007},
  crossref  = {DBLP:conf/amcis/2007},
  url       = {http://aisel.aisnet.org/amcis2007/273},
  timestamp = {Wed, 04 Jan 2012 12:49:01 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/amcis/WarkentinBJM07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/WarkentinSJ07,
  author    = {Merrill Warkentin and
               Jordan Shropshire and
               Allen C. Johnston},
  title     = {The {IT} Security Adoption Conundrum: An Initial Step Toward Validation
               of Applicable Measures},
  booktitle = {Reaching New Heights. 13th Americas Conference on Information Systems,
               {AMCIS} 2007, Keystone, Colorado, USA, August 9-12, 2007},
  pages     = {276},
  year      = {2007},
  crossref  = {DBLP:conf/amcis/2007},
  url       = {http://aisel.aisnet.org/amcis2007/276},
  timestamp = {Wed, 04 Jan 2012 12:49:01 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/amcis/WarkentinSJ07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/WarkentinGLX07,
  author    = {Merrill Warkentin and
               Chengqi Guo and
               Xin (Robert) Luo and
               Feifei Xie},
  title     = {An Assessment of {U.S.} and Chinese Online Gaming Environments and
               Futures},
  booktitle = {Reaching New Heights. 13th Americas Conference on Information Systems,
               {AMCIS} 2007, Keystone, Colorado, USA, August 9-12, 2007},
  pages     = {277},
  year      = {2007},
  crossref  = {DBLP:conf/amcis/2007},
  url       = {http://aisel.aisnet.org/amcis2007/277},
  timestamp = {Mon, 19 Nov 2012 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/amcis/WarkentinGLX07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/anis/HightowerSW07,
  author    = {Ross Hightower and
               Lutfus Sayeed and
               Merrill Warkentin},
  title     = {A Longitudinal Study of Information Exchange in Computer-Mediated
               and Face-to-Face Groups},
  booktitle = {Decision Support for Global Enterprises},
  pages     = {93--112},
  year      = {2007},
  crossref  = {DBLP:series/anis/2007-2},
  url       = {https://doi.org/10.1007/978-0-387-48137-1_6},
  doi       = {10.1007/978-0-387-48137-1_6},
  timestamp = {Tue, 16 May 2017 14:24:39 +0200},
  biburl    = {https://dblp.org/rec/bib/series/anis/HightowerSW07},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/WarkentinJA06,
  author    = {Merrill Warkentin and
               Allen C. Johnston and
               April Adams},
  title     = {User Interaction with Healthcare Information Systems: Do Healthcare
               Professionals Want to Comply with HIPAA?},
  booktitle = {Connecting the Americas. 12th Americas Conference on Information Systems,
               {AMCIS} 2006, Acapulco, M{\'{e}}xico, August 4-6, 2006},
  pages     = {326},
  year      = {2006},
  crossref  = {DBLP:conf/amcis/2006},
  url       = {http://aisel.aisnet.org/amcis2006/326},
  timestamp = {Wed, 04 Jan 2012 14:53:56 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/amcis/WarkentinJA06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/ShropshireWJS06,
  author    = {Jordan Shropshire and
               Merrill Warkentin and
               Allen C. Johnston and
               Mark B. Schmidt},
  title     = {Personality and {IT} security: An application of the five-factor model},
  booktitle = {Connecting the Americas. 12th Americas Conference on Information Systems,
               {AMCIS} 2006, Acapulco, M{\'{e}}xico, August 4-6, 2006},
  pages     = {415},
  year      = {2006},
  crossref  = {DBLP:conf/amcis/2006},
  url       = {http://aisel.aisnet.org/amcis2006/415},
  timestamp = {Wed, 04 Jan 2012 14:53:56 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/amcis/ShropshireWJS06},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cacm/WarkentinLT05,
  author    = {Merrill Warkentin and
               Xin (Robert) Luo and
               Gary F. Templeton},
  title     = {A framework for spyware assessment},
  journal   = {Commun. {ACM}},
  volume    = {48},
  number    = {8},
  pages     = {79--84},
  year      = {2005},
  url       = {http://doi.acm.org/10.1145/1076211.1076244},
  doi       = {10.1145/1076211.1076244},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/cacm/WarkentinLT05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jgim/GefenRWP05,
  author    = {David Gefen and
               Gregory M. Rose and
               Merrill Warkentin and
               Paul A. Pavlou},
  title     = {Cultural Diversity and Trust in {IT} Adoption: {A} Comparison of Potential
               e-Voters in the {USA} and South Africa},
  journal   = {{JGIM}},
  volume    = {13},
  number    = {1},
  pages     = {54--78},
  year      = {2005},
  url       = {https://doi.org/10.4018/jgim.2005010103},
  doi       = {10.4018/jgim.2005010103},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/jgim/GefenRWP05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/LeeW05,
  author    = {Cheon{-}Pyo Lee and
               Merrill Warkentin},
  title     = {The Role of Technology Anxiety and Self-Efficacy in Information Technology
               Training},
  booktitle = {A Conference on a Human Scale. 11th Americas Conference on Information
               Systems, {AMCIS} 2005, Omaha, Nebraska, USA, August 11-14, 2005},
  pages     = {309},
  year      = {2005},
  crossref  = {DBLP:conf/amcis/2005},
  url       = {http://aisel.aisnet.org/amcis2005/309},
  timestamp = {Fri, 06 Jan 2012 11:23:55 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/amcis/LeeW05},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joeuc/WarkentinDB04,
  author    = {Merrill Warkentin and
               Kimberly Davis and
               Ernst Bekkering},
  title     = {Introducing the Check-Off Password System {(COPS):} An Advancement
               in User Authentication Methods and Information Security},
  journal   = {{JOEUC}},
  volume    = {16},
  number    = {3},
  pages     = {41--58},
  year      = {2004},
  url       = {https://doi.org/10.4018/joeuc.2004070103},
  doi       = {10.4018/joeuc.2004070103},
  timestamp = {Wed, 17 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/joeuc/WarkentinDB04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/amcis/LeeWC04,
  author    = {Cheon{-}Pyo Lee and
               Merrill Warkentin and
               Haiwook Choi},
  title     = {The Role of Technological and Social Factors on the Adoption of Mobile
               Payment Technologies},
  booktitle = {10th Americas Conference on Information Systems, {AMCIS} 2004, New
               York, NY, USA, August 6-8, 2004},
  pages     = {333},
  year      = {2004},
  crossref  = {DBLP:conf/amcis/2004},
  url       = {http://aisel.aisnet.org/amcis2004/333},
  timestamp = {Sat, 07 Jan 2012 12:54:45 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/amcis/LeeWC04},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joeuc/LuegMW03,
  author    = {Jason E. Lueg and
               Robert S. Moore and
               Merrill Warkentin},
  title     = {Patient Health Information Search: An Exploratory Model of Web-based
               Search Behavior},
  journal   = {{JOEUC}},
  volume    = {15},
  number    = {4},
  pages     = {49--61},
  year      = {2003},
  url       = {https://doi.org/10.4018/joeuc.2003100103},
  doi       = {10.4018/joeuc.2003100103},
  timestamp = {Wed, 17 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/joeuc/LuegMW03},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cais/TarasewichNW02,
  author    = {Peter Tarasewich and
               Robert C. Nickerson and
               Merrill Warkentin},
  title     = {Issues in Mobile E-Commerce},
  journal   = {{CAIS}},
  volume    = {8},
  pages     = {3},
  year      = {2002},
  url       = {http://aisel.aisnet.org/cais/vol8/iss1/3},
  timestamp = {Mon, 05 Dec 2016 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/cais/TarasewichNW02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dss/ShimWCPSC02,
  author    = {Jung P. Shim and
               Merrill Warkentin and
               James F. Courtney and
               Daniel J. Power and
               Ramesh Sharda and
               Christer Carlsson},
  title     = {Past, present, and future of decision support technology},
  journal   = {Decision Support Systems},
  volume    = {33},
  number    = {2},
  pages     = {111--126},
  year      = {2002},
  url       = {https://doi.org/10.1016/S0167-9236(01)00139-7},
  doi       = {10.1016/S0167-9236(01)00139-7},
  timestamp = {Wed, 14 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/dss/ShimWCPSC02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/electronicmarkets/WarkentinGPR02,
  author    = {Merrill Warkentin and
               David Gefen and
               Paul A. Pavlou and
               Gregory M. Rose},
  title     = {Encouraging Citizen Adoption of eGovernment by Building Trust},
  journal   = {Electronic Markets},
  volume    = {12},
  number    = {3},
  pages     = {157--162},
  year      = {2002},
  url       = {https://doi.org/10.1080/101967802320245929},
  doi       = {10.1080/101967802320245929},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/electronicmarkets/WarkentinGPR02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ism/TarasewichW02,
  author    = {Peter Tarasewich and
               Merrill Warkentin},
  title     = {Information Everywhere},
  journal   = {{IS} Management},
  volume    = {19},
  number    = {1},
  pages     = {8--13},
  year      = {2002},
  url       = {https://doi.org/10.1201/1078/43199.19.1.20020101/31471.2},
  doi       = {10.1201/1078/43199.19.1.20020101/31471.2},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/ism/TarasewichW02},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jecr/WarkentinBS00,
  author    = {Merrill Warkentin and
               Ravi Bapna and
               Vijayan Sugumaran},
  title     = {The Role of Mass Customization in Enhancing Supply Chain Relationships
               in {B2C} E-Commerce Markets},
  journal   = {J. Electron. Commerce Res.},
  volume    = {1},
  number    = {2},
  pages     = {45--52},
  year      = {2000},
  url       = {http://www.csulb.edu/web/journals/jecr/issues/20002/paper1.pdf},
  timestamp = {Tue, 16 Mar 2004 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/bib/journals/jecr/WarkentinBS00},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sigecom/TarasewichW00,
  author    = {Peter Tarasewich and
               Merrill Warkentin},
  title     = {Issues in wireless E-commerce},
  journal   = {SIGecom Exchanges},
  volume    = {1},
  number    = {1},
  pages     = {21--25},
  year      = {2000},
  url       = {http://doi.acm.org/10.1145/844302.844307},
  doi       = {10.1145/844302.844307},
  timestamp = {Thu, 10 Jul 2008 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/sigecom/TarasewichW00},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isj/WarkentinB99,
  author    = {Merrill Warkentin and
               Peggy M. Beranek},
  title     = {Training to improve virtual team communication},
  journal   = {Inf. Syst. J.},
  volume    = {9},
  number    = {4},
  pages     = {271--290},
  year      = {1999},
  url       = {https://doi.org/10.1046/j.1365-2575.1999.00065.x},
  doi       = {10.1046/j.1365-2575.1999.00065.x},
  timestamp = {Fri, 26 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/isj/WarkentinB99},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/misq/LochCW92,
  author    = {Karen D. Loch and
               Houston H. Carr and
               Merrill Warkentin},
  title     = {Threats to Information Systems: Today's Reality, Yesterday's Understanding},
  journal   = {{MIS} Quarterly},
  volume    = {16},
  number    = {2},
  pages     = {173--186},
  year      = {1992},
  url       = {http://misq.org/threats-to-information-systems-today-s-reality-yesterday-s-understanding.html},
  timestamp = {Mon, 16 May 2011 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/misq/LochCW92},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/artmed/ArmasWA89,
  author    = {Sue E. Armas and
               Merrill Warkentin and
               Octavio A. Armas},
  title     = {Expert systems in laboratory medicine and pathology},
  journal   = {Artificial Intelligence in Medicine},
  volume    = {1},
  number    = {2},
  pages     = {79--85},
  year      = {1989},
  url       = {https://doi.org/10.1016/0933-3657(89)90019-5},
  doi       = {10.1016/0933-3657(89)90019-5},
  timestamp = {Thu, 15 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/bib/journals/artmed/ArmasWA89},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/amcis/2017,
  title     = {23rd Americas Conference on Information Systems, {AMCIS} 2017, Boston,
               MA, USA, August 10-12, 2017},
  publisher = {Association for Information Systems},
  year      = {2017},
  url       = {http://aisel.aisnet.org/amcis2017/},
  timestamp = {Tue, 23 May 2017 14:16:12 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/amcis/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/hicss/2017,
  title     = {50th Hawaii International Conference on System Sciences, {HICSS} 2017,
               Hilton Waikoloa Village, Hawaii, USA, January 4-7, 2017},
  publisher = {{AIS} Electronic Library (AISeL)},
  year      = {2017},
  url       = {http://aisel.aisnet.org/hicss-50/},
  timestamp = {Fri, 10 Mar 2017 15:07:22 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/hicss/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/nspw/2017,
  title     = {Proceedings of the 2017 New Security Paradigms Workshop, {NSPW} 2017,
               Santa Cruz, CA, USA, October 01-04, 2017},
  publisher = {{ACM}},
  year      = {2017},
  url       = {http://doi.acm.org/10.1145/3171533},
  doi       = {10.1145/3171533},
  timestamp = {Mon, 05 Mar 2018 20:42:48 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/nspw/2017},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/hicss/2016,
  editor    = {Tung X. Bui and
               Ralph H. Sprague Jr.},
  title     = {49th Hawaii International Conference on System Sciences, {HICSS} 2016,
               Koloa, HI, USA, January 5-8, 2016},
  publisher = {{IEEE} Computer Society},
  year      = {2016},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7426593},
  isbn      = {978-0-7695-5670-3},
  timestamp = {Tue, 05 Apr 2016 11:39:32 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/hicss/2016},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/hicss/2015,
  editor    = {Tung X. Bui and
               Ralph H. Sprague Jr.},
  title     = {48th Hawaii International Conference on System Sciences, {HICSS} 2015,
               Kauai, Hawaii, USA, January 5-8, 2015},
  publisher = {{IEEE} Computer Society},
  year      = {2015},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=7068092},
  isbn      = {978-1-4799-7367-5},
  timestamp = {Tue, 05 Apr 2016 11:39:19 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/hicss/2015},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/hicss/2014,
  title     = {47th Hawaii International Conference on System Sciences, {HICSS} 2014,
               Waikoloa, HI, USA, January 6-9, 2014},
  publisher = {{IEEE} Computer Society},
  year      = {2014},
  url       = {http://ieeexplore.ieee.org/xpl/mostRecentIssue.jsp?punumber=6751593},
  isbn      = {978-1-4799-2504-9},
  timestamp = {Tue, 05 Apr 2016 11:47:33 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/hicss/2014},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/crc/chb2014-2,
  editor    = {Heikki Topi and
               Allen Tucker},
  title     = {Computing Handbook, Third Edition: Information Systems and Information
               Technology},
  publisher = {{CRC} Press},
  year      = {2014},
  isbn      = {978-1-43-989854-3},
  timestamp = {Tue, 17 Jun 2014 13:41:03 +0200},
  biburl    = {https://dblp.org/rec/bib/books/crc/chb2014-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icis/2013,
  editor    = {Richard Baskerville and
               Michael Chau},
  title     = {Proceedings of the International Conference on Information Systems,
               {ICIS} 2013, Milano, Italy, December 15-18, 2013},
  publisher = {Association for Information Systems},
  year      = {2013},
  url       = {http://aisel.aisnet.org/icis2013/},
  timestamp = {Tue, 08 Apr 2014 15:06:58 +0200},
  biburl    = {https://dblp.org/rec/bib/conf/icis/2013},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/amcis/2012,
  title     = {18th Americas Conference on Information Systems, {AMCIS} 2012, Seattle,
               Washington August 9-11, 2012},
  publisher = {Association for Information Systems},
  year      = {2012},
  url       = {http://aisel.aisnet.org/amcis2012/},
  isbn      = {978-0-615-66346-3},
  timestamp = {Tue, 29 Jan 2013 17:22:17 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/amcis/2012},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/amcis/2011,
  editor    = {Vallabh Sambamurthy and
               Mohan Tanniru},
  title     = {A Renaissance of Information Technology for Sustainability and Global
               Competitiveness. 17th Americas Conference on Information Systems,
               {AMCIS} 2011, Detroit, Michigan, USA, August 4-8 2011},
  publisher = {Association for Information Systems},
  year      = {2011},
  url       = {http://aisel.aisnet.org/amcis2011/},
  timestamp = {Tue, 03 Jan 2012 09:17:07 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/amcis/2011},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/amcis/2009,
  editor    = {Robert C. Nickerson and
               Ramesh Sharda},
  title     = {Proceedings of the 15th Americas Conference on Information Systems,
               {AMCIS} 2009, San Francisco, California, USA, August 6-9, 2009},
  publisher = {Association for Information Systems},
  year      = {2009},
  url       = {http://aisel.aisnet.org/amcis2009/},
  timestamp = {Mon, 02 Jan 2012 19:01:22 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/amcis/2009},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/amcis/2007,
  editor    = {John A. Hoxmeier and
               Stephen Hayne},
  title     = {Reaching New Heights. 13th Americas Conference on Information Systems,
               {AMCIS} 2007, Keystone, Colorado, USA, August 9-12, 2007},
  publisher = {Association for Information Systems},
  year      = {2007},
  url       = {http://aisel.aisnet.org/amcis2007/},
  timestamp = {Wed, 04 Jan 2012 12:49:01 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/amcis/2007},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/anis/2007-2,
  editor    = {Uday R. Kulkarni and
               Daniel J. Power and
               Ramesh Sharda},
  title     = {Decision Support for Global Enterprises},
  series    = {Annals of Information Systems},
  volume    = {2},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-0-387-48137-1},
  doi       = {10.1007/978-0-387-48137-1},
  isbn      = {978-0-387-48136-4},
  timestamp = {Tue, 16 May 2017 14:24:39 +0200},
  biburl    = {https://dblp.org/rec/bib/series/anis/2007-2},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/amcis/2006,
  editor    = {Guillermo Rodr{\'{\i}}guez{-}Abitia and
               Ignacio Ania B.},
  title     = {Connecting the Americas. 12th Americas Conference on Information Systems,
               {AMCIS} 2006, Acapulco, M{\'{e}}xico, August 4-6, 2006},
  publisher = {Association for Information Systems},
  year      = {2006},
  url       = {http://aisel.aisnet.org/amcis2006/},
  timestamp = {Wed, 04 Jan 2012 14:53:56 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/amcis/2006},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/amcis/2005,
  editor    = {Deepak Khazanchi and
               Ilze Zigurs},
  title     = {A Conference on a Human Scale. 11th Americas Conference on Information
               Systems, {AMCIS} 2005, Omaha, Nebraska, USA, August 11-14, 2005},
  publisher = {Association for Information Systems},
  year      = {2005},
  url       = {http://aisel.aisnet.org/amcis2005/},
  timestamp = {Fri, 06 Jan 2012 11:23:55 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/amcis/2005},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/amcis/2004,
  title     = {10th Americas Conference on Information Systems, {AMCIS} 2004, New
               York, NY, USA, August 6-8, 2004},
  publisher = {Association for Information Systems},
  year      = {2004},
  url       = {http://aisel.aisnet.org/amcis2004/},
  timestamp = {Sat, 07 Jan 2012 12:54:45 +0100},
  biburl    = {https://dblp.org/rec/bib/conf/amcis/2004},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
maintained by Schloss Dagstuhl LZI at University of Trier