default search action
Nik Thompson
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j22]Nik Thompson, Tanya McGill, Nidhi Narula:
"No point worrying" - The role of threat devaluation in information security behavior. Comput. Secur. 143: 103897 (2024) - 2023
- [j21]Eko Harry Pratisto, Nik Thompson, Vidyasagar M. Potdar:
Virtual Reality at a Prehistoric Museum: Exploring the Influence of System Quality and Personality on User Intentions. ACM Journal on Computing and Cultural Heritage 16(2): 33:1-33:19 (2023) - [c15]Duy Dang-Pham, Nik Thompson, Atif Ahmad, Sean B. Maynard:
Exploring the Antecedents of Shadow Information Security Practices. ACIS 2023 - [c14]Jayamali M. D. Raveena, Rukshan Alexander, Kajanthy Venujan, Nik Thompson:
Factors Influencing Adoption of Digital Marketing by the Supermarkets in Sri Lanka. ACIS 2023 - 2022
- [j20]Sunitha Prabhu, Nik Thompson:
A primer on insider threats in cybersecurity. Inf. Secur. J. A Glob. Perspect. 31(5): 602-611 (2022) - [j19]Nik Thompson, Xuequn Wang, Richard L. Baskerville:
Improving IS Practical Significance through Effect Size Measures. J. Comput. Inf. Syst. 62(3): 434-441 (2022) - [j18]Eko Harry Pratisto, Nik Thompson, Vidyasagar M. Potdar:
Immersive technologies for tourism: a systematic review. J. Inf. Technol. Tour. 24(2): 181-219 (2022) - [c13]Mason Torres, Antony Mullins, Nik Thompson:
Education Cybersecurity Assessment Tool: A cybersecurity self-assessment tool for the Australian K-12 sector. ACIS 2022: 96 - 2021
- [j17]Rukshan Alexander, Nik Thompson, Tanya Jane McGill, David Murray:
The Influence of User Culture on Website Usability. Int. J. Hum. Comput. Stud. 154: 102688 (2021) - [j16]Nik Thompson, Atif Ahmad, Sean B. Maynard:
Do privacy concerns determine online information disclosure? The case of internet addiction. Inf. Comput. Secur. 29(3): 558-569 (2021) - [j15]Tanya McGill, Nik Thompson:
Exploring potential gender differences in information security and privacy. Inf. Comput. Secur. 29(5): 850-865 (2021) - [j14]Nik Thompson, Jack Brindley:
Who are you talking about? Contrasting determinants of online disclosure about self or others. Inf. Technol. People 34(3): 999-1017 (2021) - [c12]Nik Thompson, Tanya McGill, Daniel Vero Khristianto:
Public Acceptance of Internet Censorship in Indonesia. ACIS 2021: 22 - [c11]Rukshan Alexander, Tanya McGill, Nik Thompson, David Murray:
Usability Perceptions of Culturally Adapted Web Pages. ACIS 2021: 25 - 2020
- [j13]Nik Thompson, Antony Mullins, Thanavit Chongsutakawewong:
Does high e-government adoption assure stronger security? Results from a cross-country analysis of Australia and Thailand. Gov. Inf. Q. 37(1) (2020) - [j12]James Meneghello, Nik Thompson, Kevin Lee, Kok Wai Wong, Bilal Abu-Salih:
Unlocking Social Media and User Generated Content as a Data Source for Knowledge Management. Int. J. Knowl. Manag. 16(1): 101-122 (2020) - [j11]Nik Thompson, Tanya Jane McGill, Anna Bunn, Rukshan Alexander:
Cultural factors and the role of privacy concerns in acceptance of government surveillance. J. Assoc. Inf. Sci. Technol. 71(9): 1129-1142 (2020) - [j10]Nik Thompson, Xuequn Wang, Pratiq Daya:
Determinants of News Sharing Behavior on Social Media. J. Comput. Inf. Syst. 60(6): 593-601 (2020) - [c10]Sunitha Prabhu, Nik Thompson:
A Unified Classification Model of Insider Threats to Information Security. ACIS 2020: 40 - [c9]Michael Boxer, Nik Thompson:
Herd Behaviour in Cryptocurrency Markets. ACIS 2020: 42 - [c8]Mason Torres, Nik Thompson:
Toward a Cyber Security Adoption Framework for Primary and Secondary Education Providers. ACIS 2020: 93
2010 – 2019
- 2019
- [i1]James Meneghello, Nik Thompson, Kevin Lee, Kok Wai Wong, Bilal Abu-Salih:
Unlocking Analytical Value from Social Media and User Generated Content. CoRR abs/1907.11934 (2019) - 2018
- [c7]Joel Kininmonth, Nik Thompson, Tanya McGill, Anna Bunn:
Privacy Concerns and Acceptance of Government Surveillance in Australia. ACIS 2018: 19 - [c6]Tanya McGill, Nik Thompson:
Gender Differences in Information Security Perceptions and Behaviour. ACIS 2018: 21 - 2017
- [j9]Rukshan Alexander, Nik Thompson, David Murray:
Towards cultural translation of websites: a large-scale study of Australian, Chinese, and Saudi Arabian design preferences. Behav. Inf. Technol. 36(4): 351-363 (2017) - [j8]Tanya Jane McGill, Nik Thompson:
Old risks, new challenges: exploring differences in security between home computer and mobile device use. Behav. Inf. Technol. 36(11): 1111-1124 (2017) - [j7]Nik Thompson, Tanya Jane McGill, Xuequn Wang:
"Security begins at home": Determinants of home computer and mobile device security behavior. Comput. Secur. 70: 376-391 (2017) - [c5]Nik Thompson, Tanya McGill:
Mining the Mind - Applying Quantitative Techniques to Understand Mental Models of Security. ACIS 2017: 50 - [c4]Rukshan Alexander, David Murray, Nik Thompson:
Cross-Cultural Web Design Guidelines. W4A 2017: 10:1-10:4 - [c3]Rukshan Alexander, David Murray, Nik Thompson:
Cross-Cultural Web Usability Model. WISE (2) 2017: 75-89 - 2015
- [j6]Nik Thompson, Ravi Ravindran, Salvatore Nicosia:
Government data does not mean data governance: Lessons learned from a public sector application audit. Gov. Inf. Q. 32(3): 316-322 (2015) - [j5]Nik Thompson, Tanya Jane McGill:
Affective Stack - A Model for Affective Computing Application Development. J. Softw. 10(8): 919-930 (2015) - 2014
- [j4]Nik Thompson, Danny Toohey:
Teaching Case: Analysis of an Electronic Voting System. J. Inf. Syst. Educ. 25(1): 13-22 (2014) - [c2]James Meneghello, Kevin Lee, Nik Thompson:
Towards Social Media as a Data Source for Opportunistic Sensor Networking. AusDM 2014: 183-194 - 2013
- [j3]Nik Thompson, Kevin Lee:
The Digital Forensics and Security Challenge of QR Codes. J. Digit. Forensics Secur. Law 8(2): 41-72 (2013) - 2012
- [j2]Nik Thompson, Tanya Jane McGill:
Affective Tutoring Systems: Enhancing e-Learning with the Emotional Awareness of a Human Tutor. Int. J. Inf. Commun. Technol. Educ. 8(4): 75-89 (2012) - [c1]Nik Thompson, Terry Koziniec, Tanya Jane McGill:
An open affective platform. NESEA 2012: 1-10
2000 – 2009
- 2009
- [j1]Nicola Ritter, Tanya Jane McGill, Nik Thompson:
Incremental submission of programming code using object-oriented classes. ACM SIGCSE Bull. 41(4): 66-70 (2009)
Coauthor Index
aka: Tanya McGill
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-23 18:32 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint