Mark B. Schmidt

According to our database1, Mark B. Schmidt authored at least 26 papers between 2001 and 2015.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2015
An Exploratory Study on BYOD in Class: Opportunities and Concerns.
Proceedings of the 21st Americas Conference on Information Systems, 2015

2012
Natural intelligence applications for business intelligence in online and catalogue retailing firms: a case study.
Int. J. Inf. Syst. Chang. Manag., 2012

Digital Steganography - An Introduction to Techniques and Tools.
Commun. Assoc. Inf. Syst., 2012

2010
Organizational Ecology Success Factors in the Business: A Case Study at Fingerhut Inc.
Inf. Syst. Manag., 2010

2009
Managing the diffusion of organizational learning behavior.
Inf. Syst. Frontiers, 2009

An Empirical Assessment of Technology Adoption as a Choice between Alternatives.
Inf. Resour. Manag. J., 2009

Business Intelligence Successes at a Catalog and Online Retailer.
Proceedings of the Fifth International Conference on Natural Computation, 2009

Assessing Student Interest in Hybrid Course Delivery at the MBA Level.
Proceedings of the 15th Americas Conference on Information Systems, 2009

A First Approach in the Assessment of the Complexity of Disaster Recovery Models for SMEs.
Proceedings of the 15th Americas Conference on Information Systems, 2009

2008
A Cross-Cultural Comparison of U.S. and Chinese Computer Security Awareness.
J. Glob. Inf. Manag., 2008

Steganography: Forensic, Security, and Legal Issues.
J. Digit. Forensics Secur. Law, 2008

Weak Password Security: An Empirical Study.
Inf. Secur. J. A Glob. Perspect., 2008

E-commerce security threats: awareness, trust and practice.
Int. J. Inf. Syst. Chang. Manag., 2008

2007
Mitigation of Identity Theft in the Information Age.
Proceedings of the Encyclopedia of Information Ethics and Security, 2007

Rootkits and What we Know: Assessing US and Korean Knowledge and Perceptions.
Int. J. Inf. Secur. Priv., 2007

Comparing Security Perceptions of E-Commerce Users.
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007

Synthesis and Analysis of Moore and Benbasat's PCI and Witte's Susceptibility and Severity of Threat Scales.
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007

2006
Personality and IT security: An application of the five-factor model.
Proceedings of the Connecting the Americas. 12th Americas Conference on Information Systems, 2006

2005
Spyware: a little knowledge is a wonderful thing.
Commun. ACM, 2005

Busting the ghost in the machine.
Commun. ACM, 2005

Tablet PCs for Teaching Information Systems Courses.
Proceedings of the A Conference on a Human Scale. 11th Americas Conference on Information Systems, 2005

2004
Videostreaming, HorizonLive, and Tablet PCs for Teaching Information Systems Courses: Revisited.
Proceedings of the 10th Americas Conference on Information Systems, 2004

IT Does Matter (At Least When It Is Properly Managed).
Proceedings of the 10th Americas Conference on Information Systems, 2004

Wireless Network Security in Hospitality SMEs.
Proceedings of the 10th Americas Conference on Information Systems, 2004

2003
Using Streaming Technology and Tablet PCs for Teaching Information Systems.
Proceedings of the 9th Americas Conference on Information Systems, 2003

2001
Explaining is Student and is Industry Differences in Perceptions of Skill Importance.
J. Comput. Inf. Syst., 2001


  Loading...