Alexandra Durcikova

Orcid: 0000-0002-6705-202X

Affiliations:
  • The University of Oklahoma, USA


According to our database1, Alexandra Durcikova authored at least 67 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
The Paradox of Choice: Digital Akrasia in the Deployment of Multi-Factor Authentication.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

The Impact of Organizational Citizenship Behaviors on Technostress in a Post-COVID-19 Remote Work Context: The Role of Media Synchronicity.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

Assessing and Mitigating the Risk of Critical Knowledge Loss in Organizations: Insights from COVID-19 and the Great Resignation.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

2023
Phishing susceptibility across industries: The differential impact of influence techniques.
Comput. Secur., December, 2023

Security is Local: The Influence of the Immediate Workgroup on Information Security.
J. Assoc. Inf. Syst., 2023

Introduction to the Minitrack on Securing Knowledge, Innovation, and Entrepreneurial Systems and Managing Knowledge Risks.
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023

2022
Improving Phishing Reporting Using Security Gamification.
J. Manag. Inf. Syst., 2022

Knowledge Systems and Risk Management: Threat Lessons Learned from COVID-19 in 2020-21.
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022

2021
Mitigating the Security Intention-Behavior Gap: The Moderating Role of Required Effort on the Intention-Behavior Relationship.
J. Assoc. Inf. Syst., 2021

A comparison of features in a crowdsourced phishing warning system.
Inf. Syst. J., 2021

Using susceptibility claims to motivate behaviour change in IT security.
Eur. J. Inf. Syst., 2021

Revenue Cycle Management in the Wake of EMR Implementation: A Competing Logics Perspective.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

Introduction to the Minitrack on Securing Knowledge Systems and Managing Knowledge Risks.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

2020
Knowledge Systems and Risk Management: Towards a Risk and Threat Assessment Framework.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

Introduction to the Minitrack on Security in Knowledge Systems and Knowledge Management.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

2019
A quantitative textual analysis of three types of threat communication and subsequent maladaptive responses.
Comput. Secur., 2019

Data in the Wild: A KM Approach to Doing a Census Without Asking Anyone and the Issue of Privacy.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

2018
Making Rigorous Research Relevant: Innovating Statistical Action Research.
MIS Q., 2018

Knowledge exchange roles and EKR performance impact: extending the theory of knowledge reuse.
Eur. J. Inf. Syst., 2018

Introduction to the Minitrack on Knowledge Management and Information Security.
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018

2017
Combating Phishing Attacks: A Knowledge Management Approach.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

Introduction to Confidentiality, Integrity, and Availability of Knowledge and Data Minitrack.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

2016
Examining System Administrators' Verification Information to Enhance IT Training Design.
J. Comput. Inf. Syst., 2016

Knowledge sourcing from repositories: The role of system characteristics and psychological climate.
Inf. Manag., 2016

The Integrated User Satisfaction Model: Assessing Information Quality and System Quality as Second-order Constructs in System Administration.
Commun. Assoc. Inf. Syst., 2016

Introduction to Confidentiality, Integrity, and Availability of Knowledge, Innovation, and Entrepreneurial Systems Minitrack.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016

2015
Introduction to Intellectual Property and Security Minitrack.
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015

2014
Using a knowledge learning framework to predict errors in database design.
Inf. Syst., 2014

Integrating IS Security with Knowledge Management: Are We Doing Enough?
Int. J. Knowl. Manag., 2014

If it's fair, I'll share: The effect of perceived knowledge validation justice on contributions to an organizational knowledge repository.
Inf. Manag., 2014

Are Printed Documents Becoming Irrelevant? The Role of Perceived Usefulness of Knowledge Repositories in Selecting From Knowledge Sources.
Commun. Assoc. Inf. Syst., 2014

Integrating IS Security with Knowledge Management: Are We Doing Enough to Thwart the Persistent Threat?
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014

Enhancing the Motivation, Opportunity, and Ability of Knowledge Workers to Participate in Knowledge Exchange.
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014

Introduction to Knowledge Management and Security Minitrack.
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014

An Individual's Views of the Right to Privacy of Other Individuals, Companies, and Governments: A Theoretical Perspective.
Proceedings of the 20th Americas Conference on Information Systems, 2014

2013
Simplicity is Bliss: Controlling Extraneous Cognitive Load in Online Security Training to Promote Secure Behavior.
J. Organ. End User Comput., 2013

What, I Shouldn't Have Done That? : The Influence of Training and Just-in-Time Reminders on Secure Behavior.
Proceedings of the International Conference on Information Systems, 2013

Assessing Knowledge Loss Risk.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013

Introduction to KM and Security: Protecting Intellectual Property Minitrack.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013

What Kind of Interventions Can Help Users from Falling for Phishing Attempts: A Research Proposal for Examining Stage-Appropriate Interventions.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013

2012
Modeling Internet Diffusion in Developing Countries.
Australas. J. Inf. Syst., 2012

On Not Falling for Phish: Examining Multiple Stages of Protective Behavior of Information System End-Users.
Proceedings of the International Conference on Information Systems, 2012

Forget the Fluff: Examining How Media Richness Influences the Impact of Information Security Training on Secure Behavior.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012

It's Not "Just" Validation: The Effect of Organizational Justice on Contributions to a Knowledge Repository.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012

Browser Update Practices in Households: Insights from Protection Motivation Theory and Customer Satisfaction.
Proceedings of the 18th Americas Conference on Information Systems, 2012

2011
Research Note - Knowledge Exploration and Exploitation: The Impacts of Psychological Climate and Knowledge Management System Access.
Inf. Syst. Res., 2011

The influence of intrinsic and extrinsic motivation on individuals' knowledge sharing behavior.
Int. J. Hum. Comput. Stud., 2011

Get a Cue on IS Security Training: Explaining the Difference between how Security Cues and Security Arguments Improve Secure Behavior.
Proceedings of the International Conference on Information Systems, 2011

Adoption of an Electronic Knowledge Repository: A Feature-Based Approach.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011

Trends in Phishing Attacks: Suggestions for Future Research.
Proceedings of the A Renaissance of Information Technology for Sustainability and Global Competitiveness. 17th Americas Conference on Information Systems, 2011

2010
Encouraging Users to Behave Securely: Examining the Influence of Technical, Managerial, and Educational Controls on Users' Secure Behavior.
Proceedings of the International Conference on Information Systems, 2010

Knowledge Sourcing from Repositories: The Role of System Characteristics and Autonomy.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010

2009
How Knowledge Validation Processes Affect Knowledge Contribution.
J. Manag. Inf. Syst., 2009

Information Influence in Mediated Knowledge Transfer: An Experimental Test of Elaboration Likelihood.
Int. J. Knowl. Manag., 2009

Studying Knowledge Management System Success in System Administration.
Proceedings of the 42st Hawaii International International Conference on Systems Science (HICSS-42 2009), 2009

2008
Designing Tools for System Administrators: An Empirical Test of the Integrated User Satisfaction Model.
Proceedings of the 22nd Large Installation System Administration Conference, 2008

Elaboration Likelihood in Knowledge Management: A Model and Experimental Test.
Proceedings of the 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), 2008

Sysadmins and the need for verification information.
Proceedings of the 2nd ACM Symposium on Computer Human Interaction for Management of Information Technology, 2008

2007
Influence of System, Environment, and Procedures on Knowledge Submission Frequency.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

2006
The Role of Knowledge Repositories in Technical Support Environments: Speed Versus Learning in User Performance.
J. Manag. Inf. Syst., 2006

Knowledge Sourcing: A Channel Preference Perspective.
Proceedings of the Connecting the Americas. 12th Americas Conference on Information Systems, 2006

2005
Does spell-checking software need a warning label?
Commun. ACM, 2005

2004
The Role of Organizational Climate in the Use of Knowledge Management Systems to Support Problem Solving.
Proceedings of the 10th Americas Conference on Information Systems, 2004

2003
Cognitive Fit and an Intelligent Agent for a Word Processor: Should Users Take All That Advice?
Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS-36 2003), 2003

Going Beyond TAM to Predict E-Mail Use in Eastern Europe: A Focus on the Slovak Republic.
Proceedings of the 9th Americas Conference on Information Systems, 2003

The Role of Organizational Support for Creativity in Knowledge Management Systems.
Proceedings of the 9th Americas Conference on Information Systems, 2003

2002
Statistical Models (Non-Optimization Models).
Proceedings of the Encyclopedia of Information Systems, 2002


  Loading...