Multimedia big data computing and Internet of Things applications: A taxonomy and process model A Kumari, S Tanwar, S Tyagi, N Kumar, M Maasberg, KKR Choo Journal of Network and Computer Applications 124, 169-195, 2018 | 213 | 2018 |
The dark side of the insider: detecting the insider threat through examination of dark triad personality traits M Maasberg, J Warren, NL Beebe 2015 48th Hawaii International Conference on System Sciences, 3518-3526, 2015 | 126 | 2015 |
Privacy and biometrics: An empirical examination of employee concerns D Carpenter, A McLeod, C Hicks, M Maasberg Information Systems Frontiers 20, 91-110, 2018 | 80 | 2018 |
Privacy-aware smart city: A case study in collaborative filtering recommender systems F Zhang, VE Lee, R Jin, S Garg, KKR Choo, M Maasberg, L Dong, ... Journal of Parallel and Distributed Computing 127, 145-159, 2019 | 61 | 2019 |
The dark triad and insider threats in cyber security M Maasberg, C Van Slyke, S Ellis, N Beebe Communications of the ACM 63 (12), 64-80, 2020 | 35 | 2020 |
Understanding crowdsourcing contest fitness strategic decision factors and performance: An expectation-confirmation theory perspective EW Ayaburi, J Lee, M Maasberg Information Systems Frontiers 22, 1227-1240, 2020 | 30 | 2020 |
The enemy within the insider: Detecting the insider threat through addiction theory M Maasberg, NL Beebe Journal of Information Privacy and Security 10 (2), 59-70, 2014 | 26 | 2014 |
A multicultural study of biometric privacy concerns in a fire ground accountability crisis response system D Carpenter, M Maasberg, C Hicks, X Chen International Journal of Information Management 36 (5), 735-747, 2016 | 24 | 2016 |
Exploring the propagation of fake cyber news: An experimental approach M Maasberg, E Ayaburi, C Liu, Y Au | 20 | 2018 |
An analysis of motive and observable behavioral indicators associated with insider cyber-sabotage and other attacks M Maasberg, X Zhang, M Ko, SR Miller, NL Beebe IEEE Engineering Management Review 48 (2), 151-165, 2020 | 17 | 2020 |
IT career counseling: are occupational congruence and the job characteristics model effective at predicting IT job satisfaction? D Carpenter, DK Young, A McLeod Michele Journal of Information Systems Education 29 (4), 225-238, 2018 | 17 | 2018 |
An examination of factors that influence students’ IT career decisions DK Young, D Carpenter, M Maasberg Journal of Computer Information Systems 58 (3), 253-263, 2018 | 16 | 2018 |
Detecting threatening insiders with lightweight media forensics SL Garfinkel, N Beebe, L Liu, M Maasberg 2013 IEEE International Conference on Technologies for Homeland Security …, 2013 | 14 | 2013 |
Exploring a Systematic Approach to Malware Threat Assessment M Maasberg, NL Ko, Myung, Beebe 49th Annual Hawaii International Conference on System Sciences (HICSS …, 2016 | 13 | 2016 |
Employer preferences for cybersecurity skills among information systems graduates C Van Slyke, G Clary, S Ellis, M Maasberg Proceedings of the 2019 on Computers and People research Conference, 131-134, 2019 | 12 | 2019 |
Insider espionage: Recognizing ritualistic behavior by abstracting technical indicators from past cases M Maasberg | 10 | 2014 |
An empirical analysis of experienced reviewers in online communities: what, how, and why to review HS Choi, M Maasberg Electronic Markets 32 (3), 1293-1310, 2022 | 8 | 2022 |
Decision Framework for Engaging Cloud-Based Big Data Analytics Vendors EWY Ayaburi, M Maasberg, J Lee Journal of Cases on Information Technology (JCIT) 22 (4), 60-74, 2020 | 8 | 2020 |
Predicting IT job satisfaction: occupational congruence and the job characteristics model D Carpenter, DK Young, M Maasberg, A McLeod | 6 | 2017 |
Slayers vs slackers: An examination of users’ competitive differences in gamified IT platforms based on hedonic motivation system model MM Jozani, M Maasberg, E Ayaburi International Conference on Learning and Collaboration Technologies, 164-172, 2018 | 4 | 2018 |