2008 |
9 | EE | Michael Workman:
Fear Commerce: Inflationary Effects of Global Security Initiatives.
Information Security Journal: A Global Perspective 17(3): 124-131 (2008) |
8 | EE | Michael Workman,
Richard Ford,
William Allen:
A Structuration Agency Approach to Security Policy Enforcement in Mobile Ad Hoc Networks.
Information Security Journal: A Global Perspective 17(5&6): 267-277 (2008) |
7 | EE | Michael Workman:
Wisecrackers: A theory-grounded investigation of phishing and pretext social engineering threats to information security.
JASIST 59(4): 662-674 (2008) |
2007 |
6 | EE | Michael Workman:
Cognitive Load Research and Semantic Apprehension of Graphical Linguistics.
USAB 2007: 375-388 |
5 | EE | Michael Workman:
The effects from technology-mediated interaction and openness in virtual team performance measures.
Behaviour & IT 26(5): 355-365 (2007) |
4 | EE | Michael Workman:
Gaining Access with Social Engineering: An Empirical Study of the Threat.
Information Systems Security 16(6): 315-331 (2007) |
3 | EE | Michael Workman,
John Gathegi:
Punishment and ethics deterrents: A study of insider security contravention.
JASIST 58(2): 212-222 (2007) |
2 | EE | Michael Workman:
The proximal-virtual team continuum: A study of performance.
JASIST 58(6): 794-801 (2007) |
2005 |
1 | | John Gathegi,
Michael Workman:
Observance and Contravention of Information Security Measures.
Security and Management 2005: 241-247 |