Janine L. Spears

According to our database1, Janine L. Spears authored at least 16 papers between 2004 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Privacy risk in contact tracing systems.
Behav. Inf. Technol., January, 2023

2019
How Does Bryan's Online Behavior Impact His Privacy Risk Exposure?
Proceedings of the 25th Americas Conference on Information Systems, 2019

2018
<i>Teaching Tip</i>: Gaining Real-World Experience in Information Security: A Roadmap for aService-Learning Course.
J. Inf. Syst. Educ., 2018

2017
Crowd Sourcing the Creation of Personae Non Gratae for Requirements-Phase Threat Modeling.
Proceedings of the 25th IEEE International Requirements Engineering Conference, 2017

2016
Information Security Capacity Building in Community-Based Organizations: Examining the Effects of Knowledge Transfer.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016

2015
Knowledge Transfer in Information Security Capacity Building for Community-Based Organizations.
Int. J. Knowl. Manag., 2015

2014
Exploring the Effect of Knowledge Transfer Practices on User Compliance to IS Security Practices.
Int. J. Knowl. Manag., 2014

Designing Effective Knowledge Transfer Practices to Improve IS Security Awareness and Compliance.
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014

2013
<i>Teaching Case</i>: IS Security Requirements Identification from Conceptual Models in Systems Analysis and Design: The Fun & Fitness, Inc. Case.
J. Inf. Syst. Educ., 2013

Theorizing the concept and role of assurance in information systems security.
Inf. Manag., 2013

The Effects of Notice versus Awareness: An Empirical Examination of an Online Consumer's Privacy Risk Treatment.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013

2012
Conceptualizing Data Security Threats and Countermeasures in the E-Discovery Process with Misuse Cases.
Proceedings of the 18th Americas Conference on Information Systems, 2012

2010
User Participation in Information Systems Security Risk Management.
MIS Q., 2010

2006
The effects of user participation in identifying information security risk in business processes.
Proceedings of the 2006 ACM SIGMIS CPR Conference on Computer Personnel Research 2006, 2006

A Preliminary Investigation of the Impact of the Sarbanes-Oxley Act on Information Security.
Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006

2004
A Holistic Risk Analysis Method for Identifying Information Security Risks.
Proceedings of the Security Management, Integrity, and Internal Control in Information Systems, 2004


  Loading...