Dustin Ormond
Dustin Ormond
Adresse e-mail validée de creighton.edu - Page d'accueil
Titre
Citée par
Citée par
Année
Don’t make excuses! Discouraging neutralization to reduce IT policy violation
JB Barlow, M Warkentin, D Ormond, AR Dennis
Computers & Security 39 (Part B), 145-159, 2013
1682013
The quest for complete security: An empirical analysis of users’ multi-layered protection from security threats
RE Crossler, F Bélanger, D Ormond
Information Systems Frontiers, 1-15, 2019
362019
Don’t even think about it! The effects of antineutralization, informational, and normative communication on information security compliance
JB Barlow, M Warkentin, D Ormond, A Dennis
Journal of the Association for Information Systems 19 (8), 3, 2018
272018
Exploratory study on users’ behavior: Smartphone usage
LA Mutchler, JP Shim, D Ormond
AMCIS 2011 Proceedings-All Submissions, 2011
262011
Warning! A comprehensive model of the effects of digital information security warning messages
M Silic, J Barlow, D Ormond
172015
Teaching social media in business
R McHaney, M Warkentin, D Sachs, MB Pope, D Ormond
Journal of Information Technology Education: Innovations in Practice 14 (1 …, 2015
122015
Is this a joke? The impact of message manipulations on risk perceptions
D Ormond, M Warkentin
Journal of Computer Information Systems 55 (2), 9-19, 2015
122015
Integrating Cognition with an Affective Lens to Better Understand Information Security Policy Compliance
D Ormond, M Warkentin, RE Crossler
Journal of the Association for Information Systems 20 (12), 4, 2019
72019
Ethical Hacking: Addressing the Critical Shortage of Cybersecurity Talent.
HJ Kam, P Menard, D Ormond, P Katerattanakul
PACIS, 321, 2018
32018
Perceived deception: Evaluating source credibility and self-efficacy
D Ormond, M Warkentin, AC Johnston, SC Thompson
Journal of Information Privacy and Security 12 (4), 197-217, 2016
32016
The impact of affective flow on information security policy compliance
DK Ormond
Mississippi State University, 2014
32014
Don’t make excuses! Framing IT security training to reduce policy violation
JB Barlow, M Warkentin, D Ormond, AR Dennis
DeWald Roode Information Security Workshop 2012 IFIP WG 8.11/11.13 Workshop, 2012
22012
Cultivating Cybersecurity Learning: An Integration of Self-Determination and Flow
HJ Kam, P Menard, D Ormond, RE Crossler
Computers & Security, 101875, 2020
12020
Using Accountability Theory to Determine How Curiosity Affects Policy Compliance
P Menard, HJ Kam, D Ormond, RE Crossler
2020
Eating the Forbidden Fruit: Human Curiosity Entices Data Breaches
D Ormond, HJ Kam, P Menard
2019
Message quality and quantity manipulations and their effects on perceived risk
D Ormond, M Warkentin
National Decision Sciences Institute (DSI) Annual Conference, 2012
2012
Perceived deception: An evaluation of technology awareness and self-efficacy
D Ormond, M Warkentin, K Marett, A Johnston
DeWald Roode Information Security Workshop 2011 IFIP WG 8.11/11.13 Workshop, 2011
2011
Jesuit Higher Education: A Journa l
C Braymen, D Ormond
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–18