Michael Workman
Orcid: 0000-0003-2137-8494
According to our database1,
Michael Workman
authored at least 29 papers
between 2004 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2022
IEEE Trans. Educ., 2022
Identifying patterns in amyotrophic lateral sclerosis progression from sparse longitudinal data.
Nat. Comput. Sci., 2022
2021
A Framework to Test Resistency of Detection Algorithms for Stepping-Stone Intrusion on Time-Jittering Manipulation.
Wirel. Commun. Mob. Comput., 2021
Behav. Inf. Technol., 2021
Proceedings of the Advanced Information Networking and Applications, 2021
2014
New media and the changing face of information technology use: The importance of task pursuit, social influence, and experience.
Comput. Hum. Behav., 2014
2013
Inf. Secur. J. A Glob. Perspect., 2013
2012
Inf. Manag. Comput. Secur., 2012
Rash impulsivity, vengefulness, virtual-self and amplification of ethical relativism on cyber-smearing against corporations.
Comput. Hum. Behav., 2012
2010
A behaviorist perspective on corporate harassment online: Validation of a theoretical model of psychological motives.
Comput. Secur., 2010
2009
How perceptions of justice affect security attitudes: suggestions for practitioners and researchers.
Inf. Manag. Comput. Secur., 2009
A field study of corporate employee monitoring: Attitudes, absenteeism, and the moderating influences of procedural justice perceptions.
Inf. Organ., 2009
The amplification effects of procedural justice on a threat control model of information systems security behaviours.
Behav. Inf. Technol., 2009
A Matter of Trust: Studies of Organizational Systems of Justice Perceptions on Attitudes about Corporate Surveillance.
Proceedings of the 2009 International Conference on Security & Management, 2009
2008
Wisecrackers: A theory-grounded investigation of phishing and pretext social engineering threats to information security.
J. Assoc. Inf. Sci. Technol., 2008
A Structuration Agency Approach to Security Policy Enforcement in Mobile Ad Hoc Networks.
Inf. Secur. J. A Glob. Perspect., 2008
Inf. Secur. J. A Glob. Perspect., 2008
Inf. Manag. Comput. Secur., 2008
Security lapses and the omission of information security measures: A threat control model and empirical test.
Comput. Hum. Behav., 2008
Comput. Hum. Behav., 2008
2007
J. Assoc. Inf. Sci. Technol., 2007
J. Assoc. Inf. Sci. Technol., 2007
Inf. Secur. J. A Glob. Perspect., 2007
The effects from technology-mediated interaction and openness in virtual team performance measures.
Behav. Inf. Technol., 2007
Proceedings of the HCI and Usability for Medicine and Health Care, 2007
2005
Expert decision support system use, disuse, and misuse: a study using the theory of planned behavior.
Comput. Hum. Behav., 2005
Observance and Contravention of Information Security Measures.
Proceedings of The 2005 International Conference on Security and Management, 2005
2004
Performance and perceived effectiveness in computer-based and computer-aided education: do cognitive styles make a difference?
Comput. Hum. Behav., 2004