A personality based model for determining susceptibility to phishing attacks JL Parrish Jr, JL Bailey, JF Courtney Southwest Decision Sciences Institute Annual Meeting, 285-296, 2009 | 142 | 2009 |
PAPA knows best: Principles for the ethical sharing of information on social networking sites JL Parrish Ethics and Information Technology 12, 187-193, 2010 | 49 | 2010 |
Critical value factors in business intelligence systems implementations PP Dooley, Y Levy, RA Hackney, JL Parrish Analytics and data science: Advances in research and pedagogy, 55-78, 2018 | 36 | 2018 |
Churchman's inquiring systems: Kernel theories for knowledge management LP Linden, JR Kuhn Jr, JL Parrish Jr, SM Richardson, LA Adams, ... Communications of the Association for Information Systems 20 (1), 52, 2007 | 28 | 2007 |
Electronic records management in local Government agencies: The case of the clerk of courts office in lake county Florida JL Parrish Jr, JF Courtney Information Systems Management 24 (3), 223-229, 2007 | 20 | 2007 |
Critical value factors in business intelligence systems implementation success: An empirical analysis of system and information quality RA Hackney, P Dooley, Y Levvy, J Parrish | 17 | 2015 |
Capturing and conveying Chamorro cultural knowledge using social media T San Nicolas-Rocca, J Parrish International Journal of Knowledge Management (IJKM) 9 (3), 1-18, 2013 | 16 | 2013 |
Phish me, phish me not B Hanus, YA Wu, J Parrish Journal of Computer Information Systems 62 (3), 516-526, 2022 | 15 | 2022 |
Is security requirements identification from conceptual models in systems analysis and design: The Fun & Fitness, Inc. case JL Spears, JL Parrish Jr Journal of Information Systems Education 24 (1), 17-30, 2013 | 12 | 2013 |
The relationship between the “dark triad” personality traits and deviant behavior on social networking sites KL Withers, JL Parrish, S Terrell, TJ Ellis | 10 | 2017 |
Using the imagine cup sdi as the foundation for computer science capstone projects J Parrish Jr, J Bailey, B Jensen Proceedings of the 41st ACM technical symposium on Computer science …, 2010 | 10 | 2010 |
Churchman's inquirers as design templates for knowledge management systems JL Parrish Jr, JF Courtney Jr Communications of the ACM 52 (7), 126-129, 2009 | 9 | 2009 |
Sensemaking in information systems: toward a sensemaking inquiring system J Parrish | 8 | 2008 |
Resiliency as an Outcome of SETA Programs AD Landress, J Parrish, S Terrell AMCIS 2017-America's Conference on Information Systems: A Tradition of …, 2017 | 7 | 2017 |
The Role of Gamification in Motivating User Participation in Requirements Determinations S Alharthi, J Parrish | 7 | 2017 |
Toward better decisions with respect to is security: Integrating mindfulness into is security training JL Parrish, S Nicolas-Rocca | 7 | 2012 |
Mindful administration of IS security policies JL Parrish Jr, JR Kuhn Jr, JF Courtney AMCIS 2008 Proceedings, 270, 2008 | 7 | 2008 |
Pharmaceutical companies' documented and online privacy practices: Development of an index measure and initial test. SD Brown, Y Levy, MM Ramim, JL Parrish Online Journal of Applied Knowledge Management 3 (2), 2015 | 6 | 2015 |
Edge computing societal privacy and security issues S Guynes, J Parrish, R Vedder ACM SIGCAS Computers and Society 48 (3-4), 11-12, 2020 | 5 | 2020 |
Using social media to capture and convey cultural knowledge: A case of chamorro people T SanNicolas-Rocca, J Parrish 2013 46th Hawaii International Conference on System Sciences, 3386-3395, 2013 | 5 | 2013 |