Suivre
Dustin Ormond
Dustin Ormond
Adresse e-mail validée de creighton.edu - Page d'accueil
Titre
Citée par
Citée par
Année
Don’t make excuses! Discouraging neutralization to reduce IT policy violation
JB Barlow, M Warkentin, D Ormond, AR Dennis
Computers & Security 39 (Part B), 145-159, 2013
2602013
Don’t even think about it! The effects of antineutralization, informational, and normative communication on information security compliance
JB Barlow, M Warkentin, D Ormond, A Dennis
Journal of the Association for Information Systems 19 (8), 3, 2018
1482018
The quest for complete security: An empirical analysis of users’ multi-layered protection from security threats
RE Crossler, F Bélanger, D Ormond
Information Systems Frontiers 21, 343-357, 2019
822019
Integrating cognition with an affective lens to better understand information security policy compliance
D Ormond, M Warkentin, RE Crossler
Journal of the Association for Information Systems 20 (12), 4, 2019
582019
Cultivating cybersecurity learning: An integration of self-determination and flow
HJ Kam, P Menard, D Ormond, RE Crossler
Computers & Security 96, 101875, 2020
412020
Exploratory study on users’ behavior: Smartphone usage
LA Mutchler, JP Shim, D Ormond
AMCIS 2011 Proceedings-All Submissions, 2011
392011
Warning! A comprehensive model of the effects of digital information security warning messages
M Silic, J Barlow, D Ormond
The 2015 Dewald Roode Workshop on Information Systems Security Research …, 2015
212015
That's interesting: An examination of interest theory and self‐determination in organisational cybersecurity training
HJ Kam, DK Ormond, P Menard, RE Crossler
Information Systems Journal 32 (4), 888-926, 2022
192022
Perceived deception: Evaluating source credibility and self-efficacy
D Ormond, M Warkentin, AC Johnston, SC Thompson
journal of information privacy and security 12 (4), 197-217, 2016
182016
Teaching social media in business
R McHaney, M Warkentin, D Sachs, MB Pope, D Ormond
Journal of Information Technology Education. Innovations in Practice 14, 39, 2015
182015
Is this a joke? The impact of message manipulations on risk perceptions
D Ormond, M Warkentin
Journal of Computer Information Systems 55 (2), 9-19, 2015
172015
Ethical hacking: Addressing the critical shortage of cybersecurity talent
HJ Kam, P Menard, D Ormond, P Katerattanakul
82018
The impact of affective flow on information security policy compliance
DK Ormond
32014
Don’t make excuses! Framing IT security training to reduce policy violation
JB Barlow, M Warkentin, D Ormond, AR Dennis
DeWald Roode Information Security Workshop 2012 IFIP WG 8.11/11.13 Workshop, 2012
32012
Perceived deception: An evaluation of technology awareness and self-efficacy
D Ormond, M Warkentin, K Marett, A Johnston
DeWald Roode Information Security Workshop 2011 IFIP WG 8.11/11.13 Workshop, 2011
22011
Security Warning Messages Research: Past and Future
D Ormond, J Barlow
2022
The BlueBox Practicum: Integrating Technology, Culture, and Academic Service-Learning.
C Braymen, D Ormond
Jesuit Higher Education: A Journal 9 (1), 2020
2020
Using Accountability Theory to Determine How Curiosity Affects Policy Compliance
P Menard, HJ Kam, DK Ormond, RE Crossler
AMCIS 2020 PROCEEDINGS, 2020
2020
Eating the Forbidden Fruit: Human Curiosity Entices Data Breaches
D Ormond, HJ Kam, P Menard
2019
Message quality and quantity manipulations and their effects on perceived risk
D Ormond, M Warkentin
National Decision Sciences Institute (DSI) Annual Conference, 2012
2012
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20