Jeffrey Wall

Orcid: 0000-0001-9023-9223

According to our database1, Jeffrey Wall authored at least 15 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

2012
2014
2016
2018
2020
2022
2024
0
1
2
3
1
2
1
2
2
2
1
1
2
1

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Exploring the Readiness of Prominent Small Language Models for the Democratization of Financial Literacy.
CoRR, 2024

2022
Understanding employees' information security identities: an interpretive narrative approach.
Inf. Technol. People, 2022

Theorizing the Behavioral Effects of Control Complementarity in Security Control Portfolios.
Inf. Syst. Frontiers, 2022

2019
Perceived argument quality's effect on threat and coping appraisals in fear appeals: An experiment and exploration of realism check heuristics.
Inf. Manag., 2019

2018
Proposing the core contributor withdrawal theory (CCWT) to understand core contributor withdrawal from online peer-production communities.
Internet Res., 2018

The Organization Man and the Innovator: Theoretical Archetypes to Inform Behavioral Information Security Research.
Data Base, 2018

2017
Contextualized Meaning Extraction: A Meta-Algorithm for Big Data Text Mining with Pragmatics.
Int. J. Organ. Collect. Intell., 2017

To Fear or Not to Fear? A Critical Review and Analysis of Fear Appeals in the Information Security Context.
Commun. Assoc. Inf. Syst., 2017

2016
A genomic history of Aboriginal Australia.
Nat., 2016

Organizational Violations of Externally Governed Privacy and Security Rules: Explaining and Predicting Selective Violations under Conditions of Strain and Excess.
J. Assoc. Inf. Syst., 2016

2015
Critical Discourse Analysis as a Review Methodology: An Empirical Example.
Commun. Assoc. Inf. Syst., 2015

2014
Learning Computing Topics in Undergraduate Information Systems Courses: Managing Perceived Difficulty.
J. Inf. Syst. Educ., 2014

2013
Control-Related Motivations and Information Security Policy Compliance: The Effect of Reflective and Reactive Autonomy.
Proceedings of the 19th Americas Conference on Information Systems, 2013

Are Conceptualizations of Employee Compliance and Noncompliance in Information Security Research Adequate? Developing Taxonomies of Compliance and Noncompliance.
Proceedings of the 19th Americas Conference on Information Systems, 2013

2012
The Dark Side of Leadership in Information Systems Security: A Model of the Effect of Manager Transgressions on Employee Security Behaviors.
Proceedings of the 18th Americas Conference on Information Systems, 2012


  Loading...