Analysis of end user security behaviors JM Stanton, KR Stam, P Mastrangelo, J Jolton Computers & security 24 (2), 124-133, 2005 | 1064 | 2005 |
Information technology, privacy, and power within organizations: A view from boundary theory and social exchange perspectives JM Stanton, KR Stam Surveillance & Society 1 (2), 152-190, 2003 | 183 | 2003 |
The occupational culture of IS/IT personnel within organizations IR Guzman, KR Stam, JM Stanton ACM SIGMIS Database: the DATABASE for Advances in Information Systems 39 (1 …, 2008 | 141 | 2008 |
The visible employee: using workplace monitoring and surveillance to protect information assets--without compromising employee privacy or trust JM Stanton, KR Stam Information Today, Inc., 2006 | 107 | 2006 |
Behavioral information security: Two end user survey studies of motivation and security practices J Stanton, P Mastrangelo, K Stam, J Jolton | 99 | 2004 |
Events, emotions, and technology: examining acceptance of workplace technology changes KR Stam, JM Stanton Information Technology & People 23 (1), 23-53, 2010 | 97 | 2010 |
Examining the linkage between organizational commitment and information security JM Stanton, KR Stam, I Guzman, C Caledra SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems …, 2003 | 97 | 2003 |
Contexts and patterns of men's commercial sexual partnerships in northeastern Thailand: implications for AIDS prevention E Maticka-Tyndale, D Elkins, M Haswell-Elkins, D Rujkarakorn, ... Social science & medicine 44 (2), 199-213, 1997 | 90 | 1997 |
A qualitative study of the occupational subculture of information systems employees in organizations IR Guzman, JM Stanton, KR Stam, V Vijayasri, I Yamodo, N Zakaria, ... Proceedings of the 2004 SIGMIS conference on Computer personnel research …, 2004 | 58 | 2004 |
Online advocacy: Analysis of human rights NGO websites LN Kingston, KR Stam Journal of Human Rights Practice 5 (1), 75-95, 2013 | 44 | 2013 |
Employee resistance to digital information and information technology change in a social service agency: A membership category approach KR Stam, JM Stanton, IR Guzman | 39 | 2004 |
Creating digital narratives: The structure and design of stories told across multiple media P Stackelberg | 38 | 2011 |
Behavioral information security: An overview, results, and research agenda JM Stanton, KR Stam, PM Mastrangelo, JA Jolton Human-Computer Interaction and Management Information Systems: Foundations …, 2015 | 27 | 2015 |
Recovering from statelessness: Resettled Bhutanese-Nepali and Karen refugees reflect on the lack of legal nationality LN Kingston, KR Stam Journal of Human Rights 16 (4), 389-406, 2017 | 22 | 2017 |
Behavioral information security: Defining the criterion space J Stanton, C Caldera, A Isaac, K Stam, S Marcinkowski SocArXiv, 2003 | 19 | 2003 |
Struggling to start over: Human rights challenges for Somali Bantu refugees in the United States R Coughlan, K Stam, LN Kingston The International Journal of Human Rights 20 (1), 123-137, 2016 | 18 | 2016 |
Exploring security and privacy issues in hospital information system: an Information Boundary Theory perspective. N Zakaria, JM Stanton, KR Stam AMIA, 2003 | 18 | 2003 |
Relaying the message of safer sex: Condom races for community-based skills training DB Elkins, LR Dole, E Maticka-Tyndale, KR Stam Health Education Research 13 (3), 357-370, 1998 | 14 | 1998 |
Where Dreams and Dragons Meet. An Ethnographic Analysis of two Examples of Massive Multiplayer Online Role-Playing Games (MMORPGs). K Stam, M Scialdone Online–Heidelberg Journal of Religions on the Internet: Vol. 03.1 Being …, 2008 | 9 | 2008 |
Information security practices in Latin America: the case of Bolivia IR Guzman, SM Galvez, JM Stanton, KR Stam | 8 | 2010 |