Nik Thompson

Orcid: 0000-0002-0783-1371

According to our database1, Nik Thompson authored at least 35 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Virtual Reality at a Prehistoric Museum: Exploring the Influence of System Quality and Personality on User Intentions.
ACM Journal on Computing and Cultural Heritage, June, 2023

2022
Immersive technologies for tourism: a systematic review.
J. Inf. Technol. Tour., 2022

Improving IS Practical Significance through Effect Size Measures.
J. Comput. Inf. Syst., 2022

A primer on insider threats in cybersecurity.
Inf. Secur. J. A Glob. Perspect., 2022

Education Cybersecurity Assessment Tool: A cybersecurity self-assessment tool for the Australian K-12 sector.
Proceedings of the Australasian Conference on Information Systems, 2022

2021
Who are you talking about? Contrasting determinants of online disclosure about self or others.
Inf. Technol. People, 2021

Do privacy concerns determine online information disclosure? The case of internet addiction.
Inf. Comput. Secur., 2021

Exploring potential gender differences in information security and privacy.
Inf. Comput. Secur., 2021

The Influence of User Culture on Website Usability.
Int. J. Hum. Comput. Stud., 2021

Public Acceptance of Internet Censorship in Indonesia.
Proceedings of the Australasian Conference on Information Systems, 2021

Usability Perceptions of Culturally Adapted Web Pages.
Proceedings of the Australasian Conference on Information Systems, 2021

2020
Determinants of News Sharing Behavior on Social Media.
J. Comput. Inf. Syst., 2020

Cultural factors and the role of privacy concerns in acceptance of government surveillance.
J. Assoc. Inf. Sci. Technol., 2020

Unlocking Social Media and User Generated Content as a Data Source for Knowledge Management.
Int. J. Knowl. Manag., 2020

Does high e-government adoption assure stronger security? Results from a cross-country analysis of Australia and Thailand.
Gov. Inf. Q., 2020

Toward a Cyber Security Adoption Framework for Primary and Secondary Education Providers.
Proceedings of the Australasian Conference on Information Systems, 2020

A Unified Classification Model of Insider Threats to Information Security.
Proceedings of the Australasian Conference on Information Systems, 2020

Herd Behaviour in Cryptocurrency Markets.
Proceedings of the Australasian Conference on Information Systems, 2020

2019
Unlocking Analytical Value from Social Media and User Generated Content.
CoRR, 2019

2018
Gender Differences in Information Security Perceptions and Behaviour.
Proceedings of the Australasian Conference on Information Systems, 2018

Privacy Concerns and Acceptance of Government Surveillance in Australia.
Proceedings of the Australasian Conference on Information Systems, 2018

2017
"Security begins at home": Determinants of home computer and mobile device security behavior.
Comput. Secur., 2017

Old risks, new challenges: exploring differences in security between home computer and mobile device use.
Behav. Inf. Technol., 2017

Towards cultural translation of websites: a large-scale study of Australian, Chinese, and Saudi Arabian design preferences.
Behav. Inf. Technol., 2017

Cross-Cultural Web Usability Model.
Proceedings of the Web Information Systems Engineering - WISE 2017, 2017

Cross-Cultural Web Design Guidelines.
Proceedings of the 14th Web for All Conference, 2017

Mining the Mind - Applying Quantitative Techniques to Understand Mental Models of Security.
Proceedings of the Australasian Conference on Information Systems, 2017

2015
Affective Stack - A Model for Affective Computing Application Development.
J. Softw., 2015

Government data does not mean data governance: Lessons learned from a public sector application audit.
Gov. Inf. Q., 2015

2014
<i>Teaching Case</i>: Analysis of an Electronic Voting System.
J. Inf. Syst. Educ., 2014

Towards Social Media as a Data Source for Opportunistic Sensor Networking.
Proceedings of the Twelfth Australasian Data Mining Conference, AusDM 2014, Brisbane, 2014

2013
The Digital Forensics and Security Challenge of QR Codes.
J. Digit. Forensics Secur. Law, 2013

2012
Affective Tutoring Systems: Enhancing e-Learning with the Emotional Awareness of a Human Tutor.
Int. J. Inf. Commun. Technol. Educ., 2012

An open affective platform.
Proceedings of the 3rd IEEE International Conference on Networked Embedded Systems for Every Application, 2012

2009
Incremental submission of programming code using object-oriented classes.
ACM SIGCSE Bull., 2009


  Loading...