Don’t make excuses! Discouraging neutralization to reduce IT policy violation JB Barlow, M Warkentin, D Ormond, AR Dennis Computers & Security 39 (Part B), 145-159, 2013 | 264 | 2013 |
Don’t even think about it! The effects of antineutralization, informational, and normative communication on information security compliance JB Barlow, M Warkentin, D Ormond, A Dennis Journal of the Association for Information Systems 19 (8), 3, 2018 | 151 | 2018 |
The quest for complete security: An empirical analysis of users’ multi-layered protection from security threats RE Crossler, F Bélanger, D Ormond Information Systems Frontiers 21, 343-357, 2019 | 84 | 2019 |
Integrating cognition with an affective lens to better understand information security policy compliance D Ormond, M Warkentin, RE Crossler Journal of the Association for Information Systems 20 (12), 4, 2019 | 59 | 2019 |
Cultivating cybersecurity learning: An integration of self-determination and flow HJ Kam, P Menard, D Ormond, RE Crossler Computers & Security 96, 101875, 2020 | 46 | 2020 |
Exploratory study on users’ behavior: Smartphone usage LA Mutchler, JP Shim, D Ormond AMCIS 2011 Proceedings-All Submissions, 2011 | 42 | 2011 |
That's interesting: An examination of interest theory and self‐determination in organisational cybersecurity training HJ Kam, DK Ormond, P Menard, RE Crossler Information Systems Journal 32 (4), 888-926, 2022 | 24 | 2022 |
Warning! A comprehensive model of the effects of digital information security warning messages M Silic, J Barlow, D Ormond The 2015 Dewald Roode Workshop on Information Systems Security Research …, 2015 | 22 | 2015 |
Perceived deception: Evaluating source credibility and self-efficacy D Ormond, M Warkentin, AC Johnston, SC Thompson journal of information privacy and security 12 (4), 197-217, 2016 | 20 | 2016 |
Teaching social media in business R McHaney, M Warkentin, D Sachs, MB Pope, D Ormond Journal of Information Technology Education. Innovations in Practice 14, 39, 2015 | 18 | 2015 |
Is this a joke? The impact of message manipulations on risk perceptions D Ormond, M Warkentin Journal of Computer Information Systems 55 (2), 9-19, 2015 | 17 | 2015 |
Ethical hacking: Addressing the critical shortage of cybersecurity talent HJ Kam, P Menard, D Ormond, P Katerattanakul | 8 | 2018 |
The impact of affective flow on information security policy compliance DK Ormond | 3 | 2014 |
Don’t make excuses! Framing IT security training to reduce policy violation JB Barlow, M Warkentin, D Ormond, AR Dennis DeWald Roode Information Security Workshop 2012 IFIP WG 8.11/11.13 Workshop, 2012 | 3 | 2012 |
Perceived deception: An evaluation of technology awareness and self-efficacy D Ormond, M Warkentin, K Marett, A Johnston DeWald Roode Information Security Workshop 2011 IFIP WG 8.11/11.13 Workshop, 2011 | 2 | 2011 |
Security Warning Messages Research: Past and Future D Ormond, J Barlow | | 2022 |
The BlueBox Practicum: Integrating Technology, Culture, and Academic Service-Learning. C Braymen, D Ormond Jesuit Higher Education: A Journal 9 (1), 2020 | | 2020 |
Using Accountability Theory to Determine How Curiosity Affects Policy Compliance P Menard, HJ Kam, D Ormond, RE Crossler | | 2020 |
Eating the Forbidden Fruit: Human Curiosity Entices Data Breaches D Ormond, HJ Kam, P Menard | | 2019 |
Message quality and quantity manipulations and their effects on perceived risk D Ormond, M Warkentin National Decision Sciences Institute (DSI) Annual Conference, 2012 | | 2012 |