Personality, attitudes, and intentions: Predicting initial adoption of information security behavior J Shropshire, M Warkentin, S Sharma computers & security 49, 177-191, 2015 | 432 | 2015 |
The influence of the informal social learning environment on information privacy policy compliance efficacy and intention M Warkentin, AC Johnston, J Shropshire European Journal of Information Systems 20 (3), 267-284, 2011 | 347 | 2011 |
Continuance of protective security behavior: A longitudinal study M Warkentin, AC Johnston, J Shropshire, WD Barnett Decision Support Systems 92, 25-35, 2016 | 179 | 2016 |
Knowledge and skill requirements for entry-level IT workers: A longitudinal study C Aasheim, J Shropshire, L Li, C Kadlec Journal of Information Systems Education 23 (2), 193-204, 2012 | 143 | 2012 |
I’m leaving the IT field: The impact of stress, job insecurity, and burnout on IT professionals J Shropshire, C Kadlec International Journal of Information and Communication Technology Research 2 (1), 2012 | 131 | 2012 |
Personality and IT security: An application of the five-factor model J Shropshire, M Warkentin, A Johnston, M Schmidt AMCIS 2006 Proceedings, 415, 2006 | 108 | 2006 |
Where are you going? A comparative analysis of job and career change intentions among USA it workers J Shropshire, C Kadlec Journal of Internet Banking and Commerce 17 (2), 1, 2012 | 102 | 2012 |
Podcasting for e‐learning, communication, and delivery JP Shim, J Shropshire, S Park, H Harris, N Campbell Industrial Management & Data Systems 107 (4), 587-600, 2007 | 101 | 2007 |
Impact of negative message framing on security adoption JD Shropshire, M Warkentin, AC Johnston Journal of Computer Information Systems 51 (1), 41-51, 2010 | 54 | 2010 |
A canonical analysis of intentional information security breaches by insiders J Shropshire Information Management & Computer Security 17 (4), 296-310, 2009 | 49 | 2009 |
Extending the cloud with fog: Security challenges & opportunities J Shropshire | 46 | 2014 |
The IT security adoption conundrum: an initial step toward validation of applicable measures M Warkentin, J Shropshire, A Johnston AMCIS 2007 Proceedings, 276, 2007 | 33 | 2007 |
Best practices in IT disaster recovery planning among US banks C Kadlec, J Shropshire Journal of Internet Banking and Commerce 15 (1), 1-11, 2010 | 30 | 2010 |
Insight from a docker container introspection T Watts, RG Benton, WB Glisson, J Shropshire Hawaii International Conference on System Sciences 2019, 2019 | 25 | 2019 |
Analysis of monolithic and microkernel architectures: Towards secure hypervisor design J Shropshire 2014 47th Hawaii International Conference on System Sciences, 5008-5017, 2014 | 24 | 2014 |
Breakpoints: An analysis of potential hypervisor attack vectors L Turnbull, J Shropshire 2013 Proceedings of IEEE Southeastcon, 1-6, 2013 | 23 | 2013 |
Developing the IT disaster recovery planning construct J Shropshire, C Kadlec Journal of Information Technology Management 20 (4), 37, 2009 | 23 | 2009 |
Perceived value of podcasting: Student communication-medium preferences JP Shim, J Shropshire, S Park, H Harris, N Campbell | 20 | 2006 |
Rootkit detection through phase-space analysis of power voltage measurements JA Dawson, JT McDonald, J Shropshire, TR Andel, P Luckett, L Hively 2017 12th International Conference on Malicious and Unwanted Software …, 2017 | 17 | 2017 |
Uncertainty, personality, and attitudes toward DevOps J Shropshire, P Menard, B Sweeney | 17 | 2017 |