关注
kathryn stam
kathryn stam
SUNY Polytechnic Institute
在 sunypoly.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Analysis of end user security behaviors
JM Stanton, KR Stam, P Mastrangelo, J Jolton
Computers & security 24 (2), 124-133, 2005
10642005
Information technology, privacy, and power within organizations: A view from boundary theory and social exchange perspectives
JM Stanton, KR Stam
Surveillance & Society 1 (2), 152-190, 2003
1832003
The occupational culture of IS/IT personnel within organizations
IR Guzman, KR Stam, JM Stanton
ACM SIGMIS Database: the DATABASE for Advances in Information Systems 39 (1 …, 2008
1412008
The visible employee: using workplace monitoring and surveillance to protect information assets--without compromising employee privacy or trust
JM Stanton, KR Stam
Information Today, Inc., 2006
1072006
Behavioral information security: Two end user survey studies of motivation and security practices
J Stanton, P Mastrangelo, K Stam, J Jolton
992004
Events, emotions, and technology: examining acceptance of workplace technology changes
KR Stam, JM Stanton
Information Technology & People 23 (1), 23-53, 2010
972010
Examining the linkage between organizational commitment and information security
JM Stanton, KR Stam, I Guzman, C Caledra
SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems …, 2003
972003
Contexts and patterns of men's commercial sexual partnerships in northeastern Thailand: implications for AIDS prevention
E Maticka-Tyndale, D Elkins, M Haswell-Elkins, D Rujkarakorn, ...
Social science & medicine 44 (2), 199-213, 1997
901997
A qualitative study of the occupational subculture of information systems employees in organizations
IR Guzman, JM Stanton, KR Stam, V Vijayasri, I Yamodo, N Zakaria, ...
Proceedings of the 2004 SIGMIS conference on Computer personnel research …, 2004
582004
Online advocacy: Analysis of human rights NGO websites
LN Kingston, KR Stam
Journal of Human Rights Practice 5 (1), 75-95, 2013
442013
Employee resistance to digital information and information technology change in a social service agency: A membership category approach
KR Stam, JM Stanton, IR Guzman
392004
Creating digital narratives: The structure and design of stories told across multiple media
P Stackelberg
382011
Behavioral information security: An overview, results, and research agenda
JM Stanton, KR Stam, PM Mastrangelo, JA Jolton
Human-Computer Interaction and Management Information Systems: Foundations …, 2015
272015
Recovering from statelessness: Resettled Bhutanese-Nepali and Karen refugees reflect on the lack of legal nationality
LN Kingston, KR Stam
Journal of Human Rights 16 (4), 389-406, 2017
222017
Behavioral information security: Defining the criterion space
J Stanton, C Caldera, A Isaac, K Stam, S Marcinkowski
SocArXiv, 2003
192003
Struggling to start over: Human rights challenges for Somali Bantu refugees in the United States
R Coughlan, K Stam, LN Kingston
The International Journal of Human Rights 20 (1), 123-137, 2016
182016
Exploring security and privacy issues in hospital information system: an Information Boundary Theory perspective.
N Zakaria, JM Stanton, KR Stam
AMIA, 2003
182003
Relaying the message of safer sex: Condom races for community-based skills training
DB Elkins, LR Dole, E Maticka-Tyndale, KR Stam
Health Education Research 13 (3), 357-370, 1998
141998
Where Dreams and Dragons Meet. An Ethnographic Analysis of two Examples of Massive Multiplayer Online Role-Playing Games (MMORPGs).
K Stam, M Scialdone
Online–Heidelberg Journal of Religions on the Internet: Vol. 03.1 Being …, 2008
92008
Information security practices in Latin America: the case of Bolivia
IR Guzman, SM Galvez, JM Stanton, KR Stam
82010
系统目前无法执行此操作,请稍后再试。
文章 1–20