- Information and Cyber Security
- Knowledge Management and Sharing
- Team Dynamics and Performance
- Software Engineering Techniques and Practices
- Cybercrime and Law Enforcement Studies
- Technology Adoption and User Behaviour
- Information Technology Governance and Strategy
- Digital Marketing and Social Media
- Network Security and Intrusion Detection
- Complex Systems and Decision Making
- Innovative Teaching and Learning Methods
- Usability and User Interface Design
- Behavioral Health and Interventions
- Software Engineering Research
- Business Process Modeling and Analysis
- Cyberloafing and Workplace Behavior
- Terrorism, Counterterrorism, and Political Violence
- Ethics in Business and Education
- Privacy, Security, and Data Protection
- Human-Automation Interaction and Safety
- Big Data and Business Intelligence
- Bayesian Modeling and Causal Inference
- Stock Market Forecasting Methods
- Stalking, Cyberstalking, and Harassment
- Housing Market and Economics
University of Kansas
2009-2022
The University of Texas at Tyler
2015-2022
Kansas State University
2020
Government of Canada
2019
College of Business and Technology
2015-2019
Bank of Canada
2019
Louisiana Tech University
2006-2015
University of Alabama
2015
City University of Hong Kong
2013-2015
Aalto University
2015
Hedonic-motivation systems (HMS)—systems used primarily to fulfill users’ intrinsic motivations—are the elephant in room for IS research. Growth HMS sales has outperformed utilitarian-motivation (UMS) more than a decade, generating billions revenue annually; yet research focuses mostly on UMS. In this study, we explain role of motivations use and propose hedonic-motivation system adoption model (HMSAM) improve understanding adoption. Instead minor, general TAM extension, HMSAM is an...
Insiders may act to sustain and improve organizational information security, yet our knowledge of what motivates them do so remains limited. For example, most extant research relies on mere portions protection motivation theory (PMT) has focused isolated behaviors, thus limiting the generalizability findings issues, rather than addressing global set protective security behaviors. Here, we investigate motivations surrounding this larger behavioral by assessing maladaptive rewards, response...
This study evaluates the impact of varying group size and social presence on small-group communication. It compares key communication factors—faceto-face (FtF) without computer-mediated (CMC) support, FtF with CMC virtual support—on two different small sizes (3 6). Results indicate that smaller groups establish maintain higher levels quality, support have quality than groups; however, no significant difference between traditional was found. Also, minimized increased size. Process losses a...
Protecting information from a variety of security threats is daunting organizational activity. Organization managers must recognize the roles that organization insiders have in protecting resources rather than solely relying upon technology
Abstract Research shows that organisational efforts to protect their information assets from employee security threats do not always reach full potential and may actually encourage the behaviours they attempt thwart, such as reactive computer abuse (CA). To better understand this dilemma, we use fairness theory (FT) reactance (RT) explain why employees blame organisations for retaliate against enhanced policies (ISPs). We tested our model with 553 working professionals found support most of...
Protecting organizational information is a top priority for most firms. This reality, coupled with the fact that insiders control much of their organizations’ valuable information, has led both researchers and practitioners to acknowledge importance insiders’ behavior security. Until recently, have employed only few theories understand these influences, this generated calls broadened theoretical repertoire. Given opportunity, we incorporate previously developed framework emotions add...
ABSTRACT In contemporary organizations, the protection of an organization's information assets is reliant on behavior those entrusted with access to organizational and systems (IS). Because this reliance, organizations increasingly prioritize training education employees through security education, training, awareness (SETA) initiatives. Through expectancy theory its central components valence, instrumentality, (VIE), we investigate role insiders’ SETA efforts two similar, yet distinct,...
Reports indicate that employees are willing to share sensitive information under certain circumstances, and one-third half of security breaches tied insiders. These statistics reveal organizational efforts, which most often rely on deterrence-based sanctions address the insider threats security, insufficient. Thus, insiders’ computer abuse (ICA)—unauthorized deliberate misuse resources by insiders—remains a significant issue for industry. We present motive–control theory ICA distinguishes...
Presents the findings of empirical research from 61 companies, mostly USA, to identify factors that may impact implementation a system development methodology (SDM). The study uses survey instrument SDM factors. focused on perspective primary constituents: functional managers, information systems personnel and external consultants. an exploratory factor analysis identifies five important implementing SDM: organizational transition, management involvement/support, use models support. have...
Firms that are trying to stay competitive in the current business environment often require use of groups. The popularity group work is tied promise improved productivity via pooling information, knowledge, and skills. In recent years, has been expanded virtual or distributed environments. However, there questions about how aspects work-specifically size social presence-impact members' ability voice opinions. This study examines groups two sizes three distinct presence settings:...
This study investigates the effect of varying project complexity on group interaction processes small information technology (IT) teams. The projects included two complex tasks (i.e., LAN and WAN development tasks) a less task business Web site task). found that can affect process. Participants reported significantly higher expectations, integration, communication, participation while working projects. Efforts to organize personnel define roles were more effective with Power struggles...
In the recent past, researchers have shown conflicting results regarding returns to IT investment. Some posit that equivocal of investment are due inconsistent measurement firm performance following We propose use meta-analysis summarize and synthesize patterns relatively consistent relations from empirical studies during last decade.
The efficient market hypothesis (EMH) is a cornerstone of financial economics. EMH asserts that security prices fully reflect all available information and the stock securities at their fair values. Therefore, investors cannot consistently ldquobeat marketrdquo because stocks reside in perpetual equilibrium, making research efforts futile. This flies face conventional nonacademic wisdom astute analysts can beat using technical or fundamental analysis. purpose this to partially assess whether...
Usability flaws found in the later stages of software development process can be extremely costly to resolve. Accordingly, usability evaluation (UE) is an important, albeit usually expensive, part development. We report on how inexpensive UE method heuristic (HE) benefit from collaborative (CSW), implicit coordination, and principles collaboration engineering. In our study, 439 novice participants were trained HE methods then performed HE. Our results show that traditional nominal groups...