kathryn stam
kathryn stam
SUNY Polytechnic Institute
Verified email at sunypoly.edu - Homepage
Cited by
Cited by
Analysis of end user security behaviors
JM Stanton, KR Stam, P Mastrangelo, J Jolton
Computers & security 24 (2), 124-133, 2005
Information technology, privacy, and power within organizations: A view from boundary theory and social exchange perspectives
JM Stanton, KR Stam
Surveillance & Society 1 (2), 152-190, 2003
The occupational culture of IS/IT personnel within organizations
IR Guzman, KR Stam, JM Stanton
ACM SIGMIS Database: the DATABASE for Advances in Information Systems 39 (1 …, 2008
Examining the linkage between organizational commitment and information security
JM Stanton, KR Stam, I Guzman, C Caledra
SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems …, 2003
Contexts and patterns of men's commercial sexual partnerships in northeastern Thailand: implications for AIDS prevention
E Maticka-Tyndale, D Elkins, M Haswell-Elkins, D Rujkarakorn, ...
Social science & medicine 44 (2), 199-213, 1997
Behavioral information security: Two end user survey studies of motivation and security practices
J Stanton, P Mastrangelo, K Stam, J Jolton
AMCIS 2004 proceedings, 175, 2004
The visible employee: using workplace monitoring and surveillance to protect information assets--without compromising employee privacy or trust
JM Stanton, KR Stam
Information Today, Inc., 2006
Events, emotions, and technology: examining acceptance of workplace technology changes
KR Stam, JM Stanton
Information Technology & People, 2010
A qualitative study of the occupational subculture of information systems employees in organizations
IR Guzman, JM Stanton, KR Stam, V Vijayasri, I Yamodo, N Zakaria, ...
Proceedings of the 2004 SIGMIS conference on Computer personnel research …, 2004
Employee resistance to digital information and information technology change in a social service agency: A membership category approach
KR Stam, JM Stanton, IR Guzman
Journal of Digital Information 5 (4), 10-20, 2004
Online advocacy: analysis of human rights NGO websites
LN Kingston, KR Stam
Journal of Human Rights Practice 5 (1), 75-95, 2013
Behavioral information security
J Stanton, K Stam, P Mastrangelo, J Jolton
Human-Computer Interaction and Management Information Systems: Foundations, 262, 2015
Creating Digital Narratives: The Structure and Design of Stories Told Across Multiple Media
P Stackelberg
Behavioral IS security: Defining the criterion space
JM Stanton, C Caldera, A Isaac, KR Stam, SJ Marcinkowski
The Internet at work or not: Preventing computer deviance. Symposium …, 2003
Exploring security and privacy issues in hospital information system: An information boundary theory perspective
N Zakaria, J Stanton, K Stam
AMIA Annual Symposium Proceedings 2003, 1059, 2003
Relaying the message of safer sex: Condom races for community-based skills training
DB Elkins, LR Dole, E Maticka-Tyndale, KR Stam
Health Education Research 13 (3), 357-370, 1998
Recovering from statelessness: Resettled Bhutanese-Nepali and Karen refugees reflect on the lack of legal nationality
LN Kingston, KR Stam
Journal of Human Rights 16 (4), 389-406, 2017
Struggling to start over: Human rights challenges for Somali Bantu refugees in the United States
R Coughlan, K Stam, LN Kingston
The International Journal of Human Rights 20 (1), 123-137, 2016
Where Dreams and Dragons Meet. An Ethnographic Analysis of two Examples of Massive Multiplayer Online Role-Playing Games (MMORPGs).
K Stam, M Scialdone
Online–Heidelberg Journal of Religions on the Internet: Vol. 03.1 Being …, 2008
Information Security Practices in Latin America: The case of Bolivia.
IR Guzman, SM Galvez, JM Stanton, KR Stam
AMCIS, 492, 2010
The system can't perform the operation now. Try again later.
Articles 1–20