Philip Menard

Orcid: 0000-0001-8696-3198

According to our database1, Philip Menard authored at least 21 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
I'm not fluent: How linguistic fluency, new media literacy, and personality traits influence fake news engagement behavior on social media.
Inf. Manag., March, 2024

Introduction to the Minitrack on Cyber Operations, Defense, and Forensics.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

2023
Becoming a blockchain user: understanding consumers' benefits realisation to use blockchain-based applications.
Eur. J. Inf. Syst., March, 2023

2022
That's interesting: An examination of interest theory and self-determination in organisational cybersecurity training.
Inf. Syst. J., 2022

An Examination of Gain- and Loss-Framed Messaging on Smart Home Security Training Programs.
Inf. Syst. Frontiers, 2022

2020
Analyzing IOT users' mobile device privacy concerns: Extracting privacy permissions using a disclosure experiment.
Comput. Secur., 2020

Cultivating cybersecurity learning: An integration of self-determination and flow.
Comput. Secur., 2020

Using Accountability Theory to Determine How Curiosity Affects Policy Compliance.
Proceedings of the 26th Americas Conference on Information Systems, 2020

2019
Who to Trust? Applying Trust to Social Commerce.
J. Comput. Inf. Syst., 2019

Espoused cultural values as antecedents of individuals' threat and coping appraisal toward protective information technologies: Study of U.S. and Ghana.
Inf. Manag., 2019

Eating the Forbidden Fruit: Human Curiosity Entices Data Breaches.
Proceedings of the 25th Americas Conference on Information Systems, 2019

mHealth Cross-Contamination of User Health Data: Android Platform Analysis.
Proceedings of the 25th Americas Conference on Information Systems, 2019

2018
The impact of collectivism and psychological ownership on protection motivation: A cross-cultural examination.
Comput. Secur., 2018

Ethical Hacking: Addressing the Critical Shortage of Cybersecurity Talent.
Proceedings of the 22nd Pacific Asia Conference on Information Systems, 2018

Investigating Privacy Concerns of Internet of Things (IoT) Users.
Proceedings of the 24th Americas Conference on Information Systems, 2018

2017
User Motivations in Protecting Information Security: Protection Motivation Theory Versus Self-Determination Theory.
J. Manag. Inf. Syst., 2017

Shared Benefits and Information Privacy: What Determines Smart Meter Technology Adoption?
J. Assoc. Inf. Syst., 2017

Competitiveness on Social Networking Sites and Its Implications on Individuals' Security and Privacy Concerns.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

Uncertainty, Personality, and Attitudes toward DevOps.
Proceedings of the 23rd Americas Conference on Information Systems, 2017

2016
Proposing SETA Program Design Based on Employee Motivational Fit.
Proceedings of the 22nd Americas Conference on Information Systems, 2016

2014
Threat Protection and Convenience: Antecedents of Cloud-Based Data Backup.
J. Comput. Inf. Syst., 2014


  Loading...