default search action
Michael Workman
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j25]Divya Ramamoorthy
, Kristen Severson, Soumya Ghosh
, Karen Sachs, Emily G. Baxi, Alyssa N. Coyne, Elizabeth Mosmiller, Lindsey Hayes, Aianna Cerezo, Omar Ahmad, Promit Roy, Steven Zeiler, John W. Krakauer, Jonathan Li, Aneesh Donde, Nhan Huynh, Miriam Adam, Brook T. Wassie, Alexander LeNail, Natasha Leanna Patel-Murray, Yogindra Raghav, Velina Kozareva, Stanislav Tsitkov, Tobias Ehrenberger, Julia A. Kaye, Leandro Lima, Stacia K. Wyman, Edward Vertudes, Naufa Amirani, Krishna Raja, Reuben Thomas, Ryan G. Lim, Ricardo Miramontes, Jie Wu, Vineet Vaibhav, Andrea Matlock, Vidya Venkatraman, Ronald Holewenski, Niveda Sundararaman
, Rakhi Pandey, Danica-Mae Manalo, Aaron Frank, Loren Ornelas, Lindsey Panther, Emilda Gomez, Erick Galvez, Daniel Pérez, Imara Meepe, Susan Lei, Louis Pinedo, Chunyan Liu, Ruby Moran, Dhruv Sareen, Barry Landin, Carla Agurto, Guillermo A. Cecchi, Raquel Norel, Sara Thrower, Sarah Luppino, Alanna Farrar, Lindsay Pothier, Hong Yu, Ervin Sinani, Prasha Vigneswaran, Alexander V. Sherman, S. Michelle Farr, Berhan Mandefro, Hannah Trost, Maria G. Banuelos, Veronica Garcia, Michael Workman, Richie Ho
, Robert Baloh, Jennifer Roggenbuck, Matthew B. Harms, Carolyn Prina, Sarah Heintzman, Stephen Kolb, Jennifer Stocksdale, Keona Wang, Todd Morgan, Daragh Heitzman, Arish Jamil, Jennifer Jockel-Balsarotti, Elizabeth Karanja, Jesse Markway, Molly McCallum, Tim Miller, Ben Joslin, Deniz Alibazoglu, Senda Ajroud-Driss, Jay C. Beavers, Mary Bellard, Elizabeth Bruce, Nicholas J. Maragakis, Merit E. Cudkowicz, James D. Berry
, Terri Thompson
, Steven Finkbeiner, Leslie M. Thompson, Jennifer E. Van Eyk, Clive N. Svendsen, Jeffrey D. Rothstein, Jonathan D. Glass
, Christina N. Fournier, Alexander Sherman, Christian Lunetta
, David Walk, Ghazala Hayat, James Wymer, Kelly Gwathmey, Nicholas Olney, Terry Heiman-Patterson, Ximena Arcila-Londono, Kenneth Faulconer, Ervin Sanani, Alex Berger, Julia Mirochnick, Todd M. Herrington, Kenney Ng
, Ernest Fraenkel
:
Identifying patterns in amyotrophic lateral sclerosis progression from sparse longitudinal data. Nat. Comput. Sci. 2(9): 605-616 (2022) - [j24]Michael D. Workman
, J. Anthony Luévanos, Bin Mai
:
A Study of Cybersecurity Education Using a Present-Test-Practice-Assess Model. IEEE Trans. Educ. 65(1): 40-45 (2022) - 2021
- [j23]Michael Dee Workman:
Antecedents of social media activism: an analytical study of a controversial topic. Behav. Inf. Technol. 40(3): 300-310 (2021) - [j22]Lixin Wang
, Jianhua Yang, Michael Workman, Peng-Jun Wan:
A Framework to Test Resistency of Detection Algorithms for Stepping-Stone Intrusion on Time-Jittering Manipulation. Wirel. Commun. Mob. Comput. 2021: 1807509:1-1807509:8 (2021) - [c4]Jianhua Yang, Lixin Wang, Suhev Shakya, Michael Workman:
Identify Encrypted Packets to Detect Stepping-Stone Intrusion. AINA (2) 2021: 536-547
2010 – 2019
- 2014
- [j21]Michael Workman
:
New media and the changing face of information technology use: The importance of task pursuit, social influence, and experience. Comput. Hum. Behav. 31: 111-117 (2014) - 2013
- [j20]Michael Workman, Daniel C. Phelps
, Robert C. Hare:
A Study of Performative Hactivist Subcultures and Threats to Businesses. Inf. Secur. J. A Glob. Perspect. 22(4): 187-200 (2013) - 2012
- [j19]Michael Workman:
Rash impulsivity, vengefulness, virtual-self and amplification of ethical relativism on cyber-smearing against corporations. Comput. Hum. Behav. 28(1): 217-225 (2012) - [j18]Michael Workman:
Validation of a Biases Model in Strategic Security Decision-Making. Inf. Manag. Comput. Secur. 20(2): 52-70 (2012) - 2010
- [j17]Michael Workman:
A behaviorist perspective on corporate harassment online: Validation of a theoretical model of psychological motives. Comput. Secur. 29(8): 831-839 (2010)
2000 – 2009
- 2009
- [j16]Michael Workman, William H. Bommer
, Detmar W. Straub:
The amplification effects of procedural justice on a threat control model of information systems security behaviours. Behav. Inf. Technol. 28(6): 563-575 (2009) - [j15]Michael Workman:
A field study of corporate employee monitoring: Attitudes, absenteeism, and the moderating influences of procedural justice perceptions. Inf. Organ. 19(4): 218-232 (2009) - [j14]Michael Workman:
How perceptions of justice affect security attitudes: suggestions for practitioners and researchers. Inf. Manag. Comput. Secur. 17(4): 341-353 (2009) - [j13]Michael Workman:
Encyclopedia of Information and Ethics Security. J. Assoc. Inf. Sci. Technol. 60(8): 1723-1724 (2009) - [c3]Michael Workman:
A Matter of Trust: Studies of Organizational Systems of Justice Perceptions on Attitudes about Corporate Surveillance. Security and Management 2009: 501-508 - 2008
- [j12]Michael Workman:
An experimental assessment of semantic apprehension of graphical linguistics. Comput. Hum. Behav. 24(6): 2578-2596 (2008) - [j11]Michael Workman, William H. Bommer
, Detmar W. Straub:
Security lapses and the omission of information security measures: A threat control model and empirical test. Comput. Hum. Behav. 24(6): 2799-2816 (2008) - [j10]Michael Workman:
A test of interventions for security threats from social engineering. Inf. Manag. Comput. Secur. 16(5): 463-483 (2008) - [j9]Michael Workman:
Fear Commerce: Inflationary Effects of Global Security Initiatives. Inf. Secur. J. A Glob. Perspect. 17(3): 124-131 (2008) - [j8]Michael Workman, Richard Ford, William H. Allen:
A Structuration Agency Approach to Security Policy Enforcement in Mobile Ad Hoc Networks. Inf. Secur. J. A Glob. Perspect. 17(5&6): 267-277 (2008) - [j7]Michael Workman:
Wisecrackers: A theory-grounded investigation of phishing and pretext social engineering threats to information security. J. Assoc. Inf. Sci. Technol. 59(4): 662-674 (2008) - 2007
- [j6]Michael Workman:
The effects from technology-mediated interaction and openness in virtual team performance measures. Behav. Inf. Technol. 26(5): 355-365 (2007) - [j5]Michael Workman:
Gaining Access with Social Engineering: An Empirical Study of the Threat. Inf. Secur. J. A Glob. Perspect. 16(6): 315-331 (2007) - [j4]Michael Workman, John Gathegi:
Punishment and ethics deterrents: A study of insider security contravention. J. Assoc. Inf. Sci. Technol. 58(2): 212-222 (2007) - [j3]Michael Workman:
The proximal-virtual team continuum: A study of performance. J. Assoc. Inf. Sci. Technol. 58(6): 794-801 (2007) - [c2]Michael Workman:
Cognitive Load Research and Semantic Apprehension of Graphical Linguistics. USAB 2007: 375-388 - 2005
- [j2]Michael Workman:
Expert decision support system use, disuse, and misuse: a study using the theory of planned behavior. Comput. Hum. Behav. 21(2): 211-231 (2005) - [c1]John Gathegi, Michael Workman:
Observance and Contravention of Information Security Measures. Security and Management 2005: 241-247 - 2004
- [j1]Michael Workman:
Performance and perceived effectiveness in computer-based and computer-aided education: do cognitive styles make a difference? Comput. Hum. Behav. 20(4): 517-534 (2004)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 22:52 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint