
Merrill Warkentin
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j77]Zhenya Tang, Andrew Miller, Zhongyun Zhou, Merrill Warkentin:
Does government social media promote users' information security behavior towards COVID-19 scams? Cultivation effects and protective motivations. Gov. Inf. Q. 38(2): 101572 (2021) - [c32]Robert E. Crossler, France Bélanger, Carlos Torres, Allen C. Johnston, Merrill Warkentin:
Understanding Unstable Information Systems Phenomena: A Punctuated Equilibrium Perspective. HICSS 2021: 1-10 - [c31]Merrill Warkentin, Allen C. Johnston, Anthony Vance:
Introduction to the Minitrack on Innovative Behavioral IS Security and Privacy Research. HICSS 2021: 1 - 2020
- [j76]Feng Xu
, Merrill Warkentin:
Integrating elaboration likelihood model and herd theory in information security message persuasiveness. Comput. Secur. 98: 102009 (2020) - [j75]Chengqi (John) Guo
, Merrill Warkentin
, Xin (Robert) Luo
, Anil Gurung
, J. P. Shim:
An imposed etic approach with Schwartz polar dimensions to explore cross-cultural use of social network services. Inf. Manag. 57(8): 103261 (2020) - [j74]Merrill Warkentin, Craig P. Orgeron:
Using the security triad to assess blockchain technology in public sector applications. Int. J. Inf. Manag. 52: 102090 (2020) - [j73]Ali Vedadi, Merrill Warkentin:
Can Secure Behaviors Be Contagious? A Two-Stage Investigation of the Influence of Herd Behavior on Security Decisions. J. Assoc. Inf. Syst. 21(2): 3 (2020) - [j72]Leigh A. Mutchler, Merrill Warkentin:
Experience Matters: The Role of Vicarious Experience in Secure Actions. J. Database Manag. 31(2): 1-20 (2020) - [j71]Nirmalee I. Raddatz
, Thomas F. Stafford
, Craig Van Slyke, Merrill Warkentin:
Grassroots Adoption of Cloud-Based Storage Solutions. J. Inf. Syst. 34(3): 213-232 (2020) - [c30]Pardon Blessings Maoneke, Stephen V. Flowerday, Merrill Warkentin:
Evaluating the Usability of a Multilingual Passphrase Policy. AMCIS 2020 - [c29]Feng Xu, Botong Xue, Merrill Warkentin:
How do Leader Emotional Displays Influence Employees' Information Security Effort? AMCIS 2020 - [c28]Sanjay Goel, Kevin J. Williams, Jingyi Huang, Merrill Warkentin:
Understanding the Role of Incentives in Security Behavior. HICSS 2020: 1-6 - [c27]Allen C. Johnston, Merrill Warkentin, Anthony Vance:
Introduction to the Minitrack on Innovative Behavioral IS Security and Privacy Research. HICSS 2020: 1
2010 – 2019
- 2019
- [j70]Davide C. Orazi, Merrill Warkentin, Allen C. Johnston:
Integrating Construal-level Theory in Designing Fear Appeals in IS Security Research. Commun. Assoc. Inf. Syst. 45: 22 (2019) - [j69]Karen Renaud
, Robert F. Otondo
, Merrill Warkentin
:
"This is the way 'I' create my passwords" ... does the endowment effect deter people from changing the way they create their passwords? Comput. Secur. 82: 241-260 (2019) - [j68]Shwadhin Sharma, Merrill Warkentin:
Do I really belong?: Impact of employment status on information security policy compliance. Comput. Secur. 87 (2019) - [j67]Allen C. Johnston
, Merrill Warkentin
, Alan R. Dennis
, Mikko T. Siponen
:
Speak their Language: Designing Effective Messages to Improve Employees' Information Security Decision Making. Decis. Sci. 50(2): 245-284 (2019) - [j66]Zhenya Tang, Leida Chen, Zhongyun Zhou, Merrill Warkentin, Mark Lee Gillenson:
The effects of social media use on control of corruption and moderating role of cultural tightness-looseness. Gov. Inf. Q. 36(4) (2019) - [j65]Jeffrey D. Wall, Merrill Warkentin:
Perceived argument quality's effect on threat and coping appraisals in fear appeals: An experiment and exploration of realism check heuristics. Inf. Manag. 56(8) (2019) - [j64]Dustin Ormond, Merrill Warkentin, Robert E. Crossler:
Integrating Cognition with an Affective Lens to Better Understand Information Security Policy Compliance. J. Assoc. Inf. Syst. 20(12): 4 (2019) - [j63]Puzant Balozian, Dorothy E. Leidner, Merrill Warkentin:
Managers' and Employees' Differing Responses to Security Approaches. J. Comput. Inf. Syst. 59(3): 197-210 (2019) - [c26]Merrill Warkentin, Allen C. Johnston, Anthony Vance:
Introduction to the Minitrack on Innovative Behavioral IS Security and Privacy Research. HICSS 2019: 1 - 2018
- [j62]Robert F. Otondo, Robert E. Crossler, Merrill Warkentin:
Ranking Factors by Importance in Factorial Survey Analysis. Commun. Assoc. Inf. Syst. 42: 8 (2018) - [j61]Robert E. Crossler, Paul Michael Di Gangi, Allen C. Johnston, France Bélanger, Merrill Warkentin:
Providing Theoretical Foundations: Developing an Integrated Set of Guidelines for Theory Adaptation. Commun. Assoc. Inf. Syst. 43: 31 (2018) - [j60]Philip Menard, Merrill Warkentin
, Paul Benjamin Lowry:
The impact of collectivism and psychological ownership on protection motivation: A cross-cultural examination. Comput. Secur. 75: 147-166 (2018) - [j59]Karen Renaud
, Stephen Flowerday
, Merrill Warkentin
, Paul Cockshott, Craig P. Orgeron:
Is the responsibilization of the cyber security risk reasonable and judicious? Comput. Secur. 78: 198-211 (2018) - [j58]Ali Vedadi, Merrill Warkentin:
Secure Behavior over Time: Perspectives from the Theory of Process Memory. Data Base 49(SI): 39-48 (2018) - [j57]Merrill Warkentin, Shwadhin Sharma, David Gefen, Gregory M. Rose
, Paul A. Pavlou:
Social identity and trust in internet-based voting adoption. Gov. Inf. Q. 35(2): 195-209 (2018) - [j56]Robert Willison, Merrill Warkentin
, Allen C. Johnston:
Examining employee computer abuse intentions: insights from justice, deterrence and neutralization perspectives. Inf. Syst. J. 28(2): 266-293 (2018) - [j55]Jordan B. Barlow, Merrill Warkentin, Dustin Ormond, Alan R. Dennis:
Don't Even Think About It! The Effects of Antineutralization, Informational, and Normative Communication on Information Security Compliance. J. Assoc. Inf. Syst. 19(8): 3 (2018) - [c25]Andrew Miller, Merrill Warkentin:
Why Lie?: Deception of Health Information. AMCIS 2018 - [c24]Merrill Warkentin, Sanjay Goel, Kevin J. Williams, Karen Renaud:
Are we Predisposed to Behave Securely? Influence of Risk Disposition on Individual Security Behaviours. ECIS 2018: 25 - [c23]Linda G. Wallace, Merrill Warkentin, Izak Benbasat:
How Do You Handle It? An Investigation of Facebook Affordances and Envy. HICSS 2018: 1-10 - [c22]Merrill Warkentin, Allen C. Johnston, Anthony Vance:
Introduction to the Minitrack on Innovative Behavioral IS Security and Privacy Research. HICSS 2018: 1 - [c21]Ali Vedadi, Merrill Warkentin:
Sustained Secure Behavior and the Role of Self-Efficacy. ICIS 2018 - 2017
- [j54]Jie Zhang, Han Li, Xin (Robert) Luo, Merrill Warkentin
:
Exploring the Effects of the Privacy-Handling Management Styles of Social Networking Sites on User Satisfaction: A Conflict Management Perspective. Decis. Sci. 48(5): 956-989 (2017) - [j53]Linda G. Wallace, Tabitha L. James, Merrill Warkentin
:
How do you feel about your friends? Understanding situational envy in online social networks. Inf. Manag. 54(5): 669-682 (2017) - [j52]Tabitha L. James, Linda G. Wallace, Merrill Warkentin
, Byung Cho Kim, Stéphane E. Collignon:
Exposing others' information on online social networks (OSNs): Perceived shared risk, its determinants, and its influence on OSN privacy control use. Inf. Manag. 54(7): 851-865 (2017) - [j51]Shuyuan Mary Ho
, Paul Benjamin Lowry, Merrill Warkentin
, Yanyun Yang, Jonathan M. Hollister
:
Gender deception in asynchronous online communication: A path analysis. Inf. Process. Manag. 53(1): 21-41 (2017) - [j50]Shuyuan Mary Ho
, Merrill Warkentin
:
Leader's dilemma game: An experimental design for cyber insider threat research. Inf. Syst. Frontiers 19(2): 377-396 (2017) - [j49]Merrill Warkentin, Sanjay Goel, Philip Menard:
Shared Benefits and Information Privacy: What Determines Smart Meter Technology Adoption? J. Assoc. Inf. Syst. 18(11): 3 (2017) - [j48]James Lee
, Merrill Warkentin
, Robert E. Crossler
, Robert F. Otondo
:
Implications of Monitoring Mechanisms on Bring Your Own Device Adoption. J. Comput. Inf. Syst. 57(4): 309-318 (2017) - [j47]Tabitha L. James, Paul Benjamin Lowry, Linda G. Wallace, Merrill Warkentin:
The Effect of Belongingness on Obsessive-Compulsive Disorder in the Use of Online Social Networks. J. Manag. Inf. Syst. 34(2): 560-596 (2017) - [c20]Ersin Dincelli, Sanjay Goel, Merrill Warkentin:
Understanding Nuances of Privacy and Security in the Context of Information Systems. AMCIS 2017 - [c19]Ali Vedadi, Merrill Warkentin:
Developing Measurement Scales for Passwords Uniqueness and Secrecy. AMCIS 2017 - [c18]Merrill Warkentin, Allen C. Johnston, Anthony Vance:
Introduction to Innovative Behavioral IS Security and Privacy Research Minitrack. HICSS 2017: 1 - [c17]Karen Renaud, Merrill Warkentin:
Risk Homeostasis in Information Security: Challenges in Confirming Existence and Verifying Impact. NSPW 2017: 57-69 - 2016
- [j46]Ali Vedadi, Merrill Warkentin:
Continuance Intention on Using Mobile Banking Applications: A Replication Study of Information Systems Continuance Model. AIS Trans. Replication Res. 2: 7 (2016) - [j45]James Lee, Merrill Warkentin, Allen C. Johnston:
A Broader View of Perceived Risk during Internet Transactions. Commun. Assoc. Inf. Syst. 38: 8 (2016) - [j44]Merrill Warkentin
, Allen C. Johnston, Jordan Shropshire, William D. Barnett:
Continuance of protective security behavior: A longitudinal study. Decis. Support Syst. 92: 25-35 (2016) - [j43]Allen C. Johnston, Merrill Warkentin
, Maranda E. McBride, Lemuria D. Carter
:
Dispositional and situational factors: influences on information security policy violations. Eur. J. Inf. Syst. 25(3): 231-251 (2016) - [j42]Tabitha L. James, Quinton Nottingham
, Stéphane E. Collignon, Merrill Warkentin
, Jennifer L. Ziegelmayer
:
The interpersonal privacy identity (IPI): development of a privacy as control model. Inf. Technol. Manag. 17(4): 341-360 (2016) - [j41]Merrill Warkentin, Eric Walden, Allen C. Johnston, Detmar W. Straub:
Neural Correlates of Protection Motivation for Secure IT Behaviors: An fMRI Examination. J. Assoc. Inf. Syst. 17(3): 1 (2016) - [j40]Iris Reychav, Merrill Warkentin
, Martin J. Ndicu:
Tablet Adoption with Smart School Website Technology. J. Comput. Inf. Syst. 56(4): 280-287 (2016) - [c16]Merrill Warkentin
, Anthony Vance, Allen C. Johnston:
Introduction to the Minitrack on Innovative Behavioral IS Security and Privacy Research. HICSS 2016: 3635 - 2015
- [j39]Jordan Shropshire, Merrill Warkentin
, Shwadhin Sharma:
Personality, attitudes, and intentions: Predicting initial adoption of information security behavior. Comput. Secur. 49: 177-191 (2015) - [j38]Merrill Warkentin
, Brigitte Charles-Pauvers, Patrick Y. K. Chau:
Cross-cultural IS research: perspectives from Eastern and Western traditions. Eur. J. Inf. Syst. 24(3): 229-233 (2015) - [j37]Chuan Luo, Xin (Robert) Luo, Yun Xu, Merrill Warkentin
, Choon-Ling Sia
:
Examining the moderating role of sense of membership in online review evaluations. Inf. Manag. 52(3): 305-316 (2015) - [j36]Tabitha L. James, Merrill Warkentin
, Stéphane E. Collignon:
A dual privacy decision model for online social networks. Inf. Manag. 52(8): 893-908 (2015) - [j35]Dustin Ormond, Merrill Warkentin:
Is this a Joke? The Impact of Message Manipulations on Risk Perceptions. J. Comput. Inf. Syst. 55(2): 9-19 (2015) - [j34]Allen C. Johnston, Merrill Warkentin, Mikko T. Siponen:
An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to the Human Asset Through Sanctioning Rhetoric. MIS Q. 39(1): 113-134 (2015) - [c15]Merrill Warkentin
, Allen C. Johnston, Anthony Vance:
Introduction to the Innovative Behavioral IS Security and Privacy Research Minitrack. HICSS 2015: 3452 - 2014
- [j33]Philip Menard, Robert Gatlin, Merrill Warkentin:
Threat Protection and Convenience: Antecedents of Cloud-Based Data Backup. J. Comput. Inf. Syst. 55(1): 83-91 (2014) - [j32]Brad S. Trinkle, Robert E. Crossler, Merrill Warkentin:
I'm Game, are You? Reducing Real-World Security Threats by Managing Employee Activity in Online Social Networks. J. Inf. Syst. 28(2): 307-327 (2014) - [c14]Merrill Warkentin
, Allen C. Johnston, Anthony Vance:
Introduction to Innovative Behavioral IS Security and Privacy Research Minitrack. HICSS 2014: 3148 - [p2]Merrill Warkentin, Leigh A. Mutchler:
Behavioral Information Security Management. Computing Handbook, 3rd ed. (2) 2014: 54: 1-20 - 2013
- [j31]Robert E. Crossler
, Allen C. Johnston, Paul Benjamin Lowry, Qing Hu, Merrill Warkentin
, Richard L. Baskerville:
Future directions for behavioral information security research. Comput. Secur. 32: 90-101 (2013) - [j30]Jordan B. Barlow, Merrill Warkentin
, Dustin Ormond, Alan R. Dennis:
Don't make excuses! Discouraging neutralization to reduce IT policy violation. Comput. Secur. 39: 145-159 (2013) - [j29]Xin (Robert) Luo, Merrill Warkentin, Han Li:
Understanding Technology Adoption Trade-Offs: A Conjoint Analysis Approach. J. Comput. Inf. Syst. 53(3): 65-74 (2013) - [j28]Robert Willison, Merrill Warkentin:
Beyond Deterrence: An Expanded View of Employee Computer Abuse. MIS Q. 37(1): 1-20 (2013) - [c13]James Lee, Robert E. Crossler, Merrill Warkentin:
Implications of Monitoring Mechanisms on Bring Your Own Device (BYOD) Adoption. ICIS 2013 - 2012
- [j27]Michael Brian Pope, Merrill Warkentin, Leigh A. Mutchler, Xin (Robert) Luo:
The Domain Name System - Past, Present, and Future. Commun. Assoc. Inf. Syst. 30: 21 (2012) - [j26]Michael Brian Pope, Merrill Warkentin, Ernst Bekkering, Mark B. Schmidt:
Digital Steganography - An Introduction to Techniques and Tools. Commun. Assoc. Inf. Syst. 30: 22 (2012) - [j25]Merrill Warkentin
, Vijayan Sugumaran, Robert Sainsbury:
The role of intelligent agents and data mining in electronic partnership management. Expert Syst. Appl. 39(18): 13277-13288 (2012) - [j24]Michael Brian Pope, Merrill Warkentin, Xin (Robert) Luo:
Evolutionary Malware: Mobile Malware, Botnets, and Malware Toolkits. Int. J. Wirel. Networks Broadband Technol. 2(3): 52-60 (2012) - [c12]Merrill Warkentin, Nirmalee Malimage:
Overcoming Mixed-Gender Requirements Misspecification with the Modified Coherence Method. AMCIS 2012 - [c11]Merrill Warkentin, Maranda E. McBride, Lemuria D. Carter, Allen C. Johnston:
The Role of Individual Characteristics on Insider Abuse Intentions. AMCIS 2012 - [c10]Merrill Warkentin, Shwadhin Sharma, David Gefen, Paul A. Pavlou, Gregory M. Rose:
Government of the People, By the People: A Look at Trust in eGovernment. AMCIS 2012 - 2011
- [j23]Han Li, Ashish Gupta, Xin (Robert) Luo, Merrill Warkentin
:
Exploring the impact of instant messaging on subjective task complexity and user satisfaction. Eur. J. Inf. Syst. 20(2): 139-155 (2011) - [j22]Merrill Warkentin
, Allen C. Johnston, Jordan Shropshire:
The influence of the informal social learning environment on information privacy policy compliance efficacy and intention. Eur. J. Inf. Syst. 20(3): 267-284 (2011) - [c9]Merrill Warkentin, Robert Willison, Allen C. Johnston:
The Role of Perceptions of Organizational Injustice and Techniques of Neutralization in Forming Computer Abuse Intentions. AMCIS 2011 - 2010
- [j21]Jordan Shropshire, Merrill Warkentin, Allen C. Johnston:
Impact of Negative Message Framing on Security Adoption. J. Comput. Inf. Syst. 51(1): 41-51 (2010) - [j20]Allen C. Johnston, Merrill Warkentin:
The Influence of Perceived Source Credibility on End User Attitudes and Intentions to Comply with Recommended IT Actions. J. Organ. End User Comput. 22(3): 1-21 (2010) - [j19]Allen C. Johnston, Merrill Warkentin:
Fear Appeals and Information Security Behaviors: An Empirical Study. MIS Q. 34(3): 549-566 (2010)
2000 – 2009
- 2009
- [j18]Merrill Warkentin, Robert S. Moore, Ernst Bekkering, Allen C. Johnston:
Analysis of systems development project risks: an integrative framework. Data Base 40(2): 8-27 (2009) - [j17]Merrill Warkentin
, Robert Willison:
Behavioral and policy issues in information systems security: the insider threat. Eur. J. Inf. Syst. 18(2): 101-105 (2009) - [j16]Ernst Bekkering, Allen C. Johnston, Merrill Warkentin
, Mark B. Schmidt:
An Empirical Assessment of Technology Adoption as a Choice between Alternatives. Inf. Resour. Manag. J. 22(4): 23-44 (2009) - [c8]Xin (Robert) Luo, Merrill Warkentin, Allen C. Johnston:
The Impact of National Culture on Workplace Privacy Expectations in the Context of Information Security Assurance. AMCIS 2009: 521 - 2008
- [j15]Allen C. Johnston, Merrill Warkentin
:
Information privacy compliance in the healthcare industry. Inf. Manag. Comput. Secur. 16(1): 5-19 (2008) - [j14]Merrill Warkentin, Ernst Bekkering, Mark B. Schmidt:
Steganography: Forensic, Security, and Legal Issues. J. Digit. Forensics Secur. Law 3(2): 17-34 (2008) - 2007
- [c7]Merrill Warkentin, Ernst Bekkering, Allen C. Johnston, Robert S. Moore:
Risk Perspectives in Systems Development. AMCIS 2007: 273 - [c6]Merrill Warkentin, Jordan Shropshire, Allen C. Johnston:
The IT Security Adoption Conundrum: An Initial Step Toward Validation of Applicable Measures. AMCIS 2007: 276 - [c5]Merrill Warkentin, Chengqi Guo, Xin (Robert) Luo, Feifei Xie:
An Assessment of U.S. and Chinese Online Gaming Environments and Futures. AMCIS 2007: 277 - [p1]Ross Hightower, Lutfus Sayeed, Merrill Warkentin:
A Longitudinal Study of Information Exchange in Computer-Mediated and Face-to-Face Groups. Decision Support for Global Enterprises 2007: 93-112 - 2006
- [c4]Merrill Warkentin, Allen C. Johnston, April Adams:
User Interaction with Healthcare Information Systems: Do Healthcare Professionals Want to Comply with HIPAA? AMCIS 2006: 326 - [c3]Jordan Shropshire, Merrill Warkentin, Allen C. Johnston, Mark B. Schmidt:
Personality and IT security: An application of the five-factor model. AMCIS 2006: 415 - 2005
- [j13]Merrill Warkentin
, Xin (Robert) Luo, Gary F. Templeton:
A framework for spyware assessment. Commun. ACM 48(8): 79-84 (2005) - [j12]David Gefen, Gregory M. Rose
, Merrill Warkentin, Paul A. Pavlou:
Cultural Diversity and Trust in IT Adoption: A Comparison of Potential e-Voters in the USA and South Africa. J. Glob. Inf. Manag. 13(1): 54-78 (2005) - [c2]Cheon-Pyo Lee, Merrill Warkentin:
The Role of Technology Anxiety and Self-Efficacy in Information Technology Training. AMCIS 2005: 309 - 2004
- [j11]Merrill Warkentin, Kimberly Davis, Ernst Bekkering:
Introducing the Check-Off Password System (COPS): An Advancement in User Authentication Methods and Information Security. J. Organ. End User Comput. 16(3): 41-58 (2004) - [c1]Cheon-Pyo Lee, Merrill Warkentin, Haiwook Choi:
The Role of Technological and Social Factors on the Adoption of Mobile Payment Technologies. AMCIS 2004: 333 - 2003
- [j10]Jason E. Lueg, Robert S. Moore, Merrill Warkentin:
Patient Health Information Search: An Exploratory Model of Web-based Search Behavior. J. Organ. End User Comput. 15(4): 49-61 (2003) - 2002
- [j9]Peter Tarasewich, Robert C. Nickerson, Merrill Warkentin:
Issues in Mobile E-Commerce. Commun. Assoc. Inf. Syst. 8: 3 (2002) - [j8]Jung P. Shim, Merrill Warkentin
, James F. Courtney, Daniel J. Power
, Ramesh Sharda, Christer Carlsson:
Past, present, and future of decision support technology. Decis. Support Syst. 33(2): 111-126 (2002) - [j7]Merrill Warkentin, David Gefen, Paul A. Pavlou, Gregory M. Rose
:
Encouraging Citizen Adoption of eGovernment by Building Trust. Electron. Mark. 12(3): 157-162 (2002) - [j6]Peter Tarasewich, Merrill Warkentin:
Information Everywhere. Inf. Syst. Manag. 19(1): 8-13 (2002) - 2000
- [j5]Merrill Warkentin, Ravi Bapna, Vijayan Sugumaran:
The Role of Mass Customization in Enhancing Supply Chain Relationships in B2C E-Commerce Markets. J. Electron. Commer. Res. 1(2): 45-52 (2000) - [j4]Peter Tarasewich, Merrill Warkentin:
Issues in wireless E-commerce. SIGecom Exch. 1(1): 21-25 (2000)
1990 – 1999
- 1999
- [j3]Merrill Warkentin, Peggy M. Beranek:
Training to improve virtual team communication. Inf. Syst. J. 9(4): 271-290 (1999) - 1992
- [j2]Karen D. Loch, Houston H. Carr, Merrill Warkentin:
Threats to Information Systems: Today's Reality, Yesterday's Understanding. MIS Q. 16(2): 173-186 (1992)
1980 – 1989
- 1989
- [j1]Sue E. Armas, Merrill Warkentin
, Octavio A. Armas:
Expert systems in laboratory medicine and pathology. Artif. Intell. Medicine 1(2): 79-85 (1989)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2021-04-10 02:54 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint