2008 | ||
---|---|---|
9 | EE | Michael Workman: Fear Commerce: Inflationary Effects of Global Security Initiatives. Information Security Journal: A Global Perspective 17(3): 124-131 (2008) |
8 | EE | Michael Workman, Richard Ford, William Allen: A Structuration Agency Approach to Security Policy Enforcement in Mobile Ad Hoc Networks. Information Security Journal: A Global Perspective 17(5&6): 267-277 (2008) |
7 | EE | Michael Workman: Wisecrackers: A theory-grounded investigation of phishing and pretext social engineering threats to information security. JASIST 59(4): 662-674 (2008) |
2007 | ||
6 | EE | Michael Workman: Cognitive Load Research and Semantic Apprehension of Graphical Linguistics. USAB 2007: 375-388 |
5 | EE | Michael Workman: The effects from technology-mediated interaction and openness in virtual team performance measures. Behaviour & IT 26(5): 355-365 (2007) |
4 | EE | Michael Workman: Gaining Access with Social Engineering: An Empirical Study of the Threat. Information Systems Security 16(6): 315-331 (2007) |
3 | EE | Michael Workman, John Gathegi: Punishment and ethics deterrents: A study of insider security contravention. JASIST 58(2): 212-222 (2007) |
2 | EE | Michael Workman: The proximal-virtual team continuum: A study of performance. JASIST 58(6): 794-801 (2007) |
2005 | ||
1 | John Gathegi, Michael Workman: Observance and Contravention of Information Security Measures. Security and Management 2005: 241-247 |
1 | William Allen | [8] |
2 | Richard Ford | [8] |
3 | John Gathegi | [1] [3] |