Cited By
View all- Wakefield RWakefield L(2024)How Do Job Seekers Respond to Cybervetting? An Exploration of Threats, Fear, and Access ControlACM SIGMIS Database: the DATABASE for Advances in Information Systems10.1145/3645057.364506455:1(136-155)Online publication date: 6-Feb-2024
- Burns ARoberts TPosey CLowry PFuller B(2023)Going Beyond DeterrenceInformation Systems Research10.1287/isre.2022.113334:1(342-362)Online publication date: 1-Mar-2023
- Khern-am-nuai WHashim MPinsonneault AYang WLi N(2023)Augmenting Password Strength Meter Design Using the Elaboration Likelihood ModelInformation Systems Research10.1287/isre.2022.112534:1(157-177)Online publication date: 1-Mar-2023
- Show More Cited By