default search action
Michele Maasberg
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Sahar Farshadkhah, Michele Maasberg, T. Selwyn Ellis, Craig Van Slyke:
An Empirical Examination of Employee Information Security Advice Sharing. J. Comput. Inf. Syst. 64(1): 31-46 (2024) - 2022
- [j10]Hoon Seok Choi, Michele Maasberg:
An empirical analysis of experienced reviewers in online communities: what, how, and why to review. Electron. Mark. 32(3): 1293-1310 (2022) - 2020
- [j9]Michele Maasberg, Craig Van Slyke, Selwyn Ellis, Nicole Beebe:
The dark triad and insider threats in cyber security. Commun. ACM 63(12): 64-80 (2020) - [j8]Emmanuel W. Ayaburi, Jaeung Lee, Michele Maasberg:
Understanding Crowdsourcing Contest Fitness Strategic Decision Factors and Performance: An Expectation-Confirmation Theory Perspective. Inf. Syst. Frontiers 22(5): 1227-1240 (2020) - [j7]Emmanuel Wusuhon Yanibo Ayaburi, Michele Maasberg, Jaeung Lee:
Decision Framework for Engaging Cloud-Based Big Data Analytics Vendors. J. Cases Inf. Technol. 22(4): 60-74 (2020)
2010 – 2019
- 2019
- [j6]Feng Zhang, Victor E. Lee, Ruoming Jin, Saurabh Garg, Kim-Kwang Raymond Choo, Michele Maasberg, Lijun Dong, Chi Cheng:
Privacy-aware smart city: A case study in collaborative filtering recommender systems. J. Parallel Distributed Comput. 127: 145-159 (2019) - [c8]Craig Van Slyke, William Grant Clary, Selwyn Ellis, Michele Maasberg:
Employer Preferences for Cybersecurity Skills among Information Systems Graduates. SIGMIS-CPR 2019: 131-134 - 2018
- [j5]Darrell Carpenter, Alexander J. McLeod Jr., Chelsea Hicks, Michele Maasberg:
Privacy and biometrics: An empirical examination of employee concerns. Inf. Syst. Frontiers 20(1): 91-110 (2018) - [j4]Diana K. Young, Darrell Carpenter, Michele Maasberg:
An Examination of Factors That Influence Students' IT Career Decisions. J. Comput. Inf. Syst. 58(3): 253-263 (2018) - [j3]Darrell Carpenter, Diana K. Young, Alexander J. McLeod Jr., Michele Maasberg:
IT Career Counseling: Are Occupational Congruence and the Job Characteristics Model Effective at Predicting IT Job Satisfaction? J. Inf. Syst. Educ. 29(4): 225-238 (2018) - [j2]Aparna Kumari, Sudeep Tanwar, Sudhanshu Tyagi, Neeraj Kumar, Michele Maasberg, Kim-Kwang Raymond Choo:
Multimedia big data computing and Internet of Things applications: A taxonomy and process model. J. Netw. Comput. Appl. 124: 169-195 (2018) - [c7]Bruce C. Herniter, Michele Maasberg:
IT Project Crisis and Escalation. AMCIS 2018 - [c6]Mohsen M. Jozani, Michele Maasberg, Emmanuel Ayaburi:
Slayers vs Slackers: An Examination of Users' Competitive Differences in Gamified IT Platforms Based on Hedonic Motivation System Model. HCI (25) 2018: 164-172 - [c5]Michele Maasberg, Emmanuel Ayaburi, Charles Liu, Yoris Au:
Exploring the Propagation of Fake Cyber News: An Experimental Approach. HICSS 2018: 1-10 - 2017
- [c4]Darrell Carpenter, Diana K. Young, Michele Maasberg, Alexander J. McLeod Jr.:
Predicting IT Job Satisfaction: Occupational Congruence and the Job Characteristics Model. AMCIS 2017 - 2016
- [j1]Darrell Carpenter, Michele Maasberg, Chelsea Hicks, Xiaogang Chen:
A multicultural study of biometric privacy concerns in a fire ground accountability crisis response system. Int. J. Inf. Manag. 36(5): 735-747 (2016) - [c3]Michele Maasberg, Myung Ko, Nicole Lang Beebe:
Exploring a Systematic Approach to Malware Threat Assessment. HICSS 2016: 5517-5526 - 2015
- [c2]Michele Maasberg, John Warren, Nicole Lang Beebe:
The Dark Side of the Insider: Detecting the Insider Threat through Examination of Dark Triad Personality Traits. HICSS 2015: 3518-3526 - [c1]Michele Maasberg, Charles Liu:
Network Effects and Data Breaches: Investigating the Impact of Information Sharing and the Cyber Black Market. ICIS 2015
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-20 21:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint