Michael Workman

Orcid: 0000-0003-2137-8494

According to our database1, Michael Workman authored at least 29 papers between 2004 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
A Study of Cybersecurity Education Using a Present-Test-Practice-Assess Model.
IEEE Trans. Educ., 2022

Identifying patterns in amyotrophic lateral sclerosis progression from sparse longitudinal data.
, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,
Nat. Comput. Sci., 2022

2021
A Framework to Test Resistency of Detection Algorithms for Stepping-Stone Intrusion on Time-Jittering Manipulation.
Wirel. Commun. Mob. Comput., 2021

Antecedents of social media activism: an analytical study of a controversial topic.
Behav. Inf. Technol., 2021

Identify Encrypted Packets to Detect Stepping-Stone Intrusion.
Proceedings of the Advanced Information Networking and Applications, 2021

2014
New media and the changing face of information technology use: The importance of task pursuit, social influence, and experience.
Comput. Hum. Behav., 2014

2013
A Study of Performative Hactivist Subcultures and Threats to Businesses.
Inf. Secur. J. A Glob. Perspect., 2013

2012
Validation of a Biases Model in Strategic Security Decision-Making.
Inf. Manag. Comput. Secur., 2012

Rash impulsivity, vengefulness, virtual-self and amplification of ethical relativism on cyber-smearing against corporations.
Comput. Hum. Behav., 2012

2010
A behaviorist perspective on corporate harassment online: Validation of a theoretical model of psychological motives.
Comput. Secur., 2010

2009
Encyclopedia of Information and Ethics Security.
J. Assoc. Inf. Sci. Technol., 2009

How perceptions of justice affect security attitudes: suggestions for practitioners and researchers.
Inf. Manag. Comput. Secur., 2009

A field study of corporate employee monitoring: Attitudes, absenteeism, and the moderating influences of procedural justice perceptions.
Inf. Organ., 2009

The amplification effects of procedural justice on a threat control model of information systems security behaviours.
Behav. Inf. Technol., 2009

A Matter of Trust: Studies of Organizational Systems of Justice Perceptions on Attitudes about Corporate Surveillance.
Proceedings of the 2009 International Conference on Security & Management, 2009

2008
Wisecrackers: A theory-grounded investigation of phishing and pretext social engineering threats to information security.
J. Assoc. Inf. Sci. Technol., 2008

A Structuration Agency Approach to Security Policy Enforcement in Mobile Ad Hoc Networks.
Inf. Secur. J. A Glob. Perspect., 2008

Fear Commerce: Inflationary Effects of Global Security Initiatives.
Inf. Secur. J. A Glob. Perspect., 2008

A test of interventions for security threats from social engineering.
Inf. Manag. Comput. Secur., 2008

Security lapses and the omission of information security measures: A threat control model and empirical test.
Comput. Hum. Behav., 2008

An experimental assessment of semantic apprehension of graphical linguistics.
Comput. Hum. Behav., 2008

2007
Punishment and ethics deterrents: A study of insider security contravention.
J. Assoc. Inf. Sci. Technol., 2007

The proximal-virtual team continuum: A study of performance.
J. Assoc. Inf. Sci. Technol., 2007

Gaining Access with Social Engineering: An Empirical Study of the Threat.
Inf. Secur. J. A Glob. Perspect., 2007

The effects from technology-mediated interaction and openness in virtual team performance measures.
Behav. Inf. Technol., 2007

Cognitive Load Research and Semantic Apprehension of Graphical Linguistics.
Proceedings of the HCI and Usability for Medicine and Health Care, 2007

2005
Expert decision support system use, disuse, and misuse: a study using the theory of planned behavior.
Comput. Hum. Behav., 2005

Observance and Contravention of Information Security Measures.
Proceedings of The 2005 International Conference on Security and Management, 2005

2004
Performance and perceived effectiveness in computer-based and computer-aided education: do cognitive styles make a difference?
Comput. Hum. Behav., 2004


  Loading...