Who to trust? Applying trust to social commerce S Sharma, P Menard, LA Mutchler Journal of Computer Information Systems 59 (1), 32-42, 2019 | 178 | 2019 |
Exploratory study on users’ behavior: Smartphone usage LA Mutchler, JP Shim, D Ormond | 39 | 2011 |
the domain name system—past, present, and future MB Pope, M Warkentin, LA Mutchler, XR Luo Communications of the Association for Information Systems 30 (1), 21, 2012 | 21 | 2012 |
I’m safer than you: the role of optimism bias in personal IT risk assessments M Warkentin, Z Xu, LA Mutchler Proceedings of, 1-32, 2013 | 14 | 2013 |
Self-efficacy in information security: A replication study B Xue, M Warkentin, LA Mutchler, P Balozian Journal of Computer Information Systems 63 (1), 1-10, 2023 | 12 | 2023 |
Response awareness and instructional self-efficacy: influences on intent LA Mutchler Information & Computer Security 27 (4), 489-507, 2019 | 9 | 2019 |
How direct and vicarious experience promotes security hygiene LA Mutchler, M Warkentin Proceedings of the 10th Annual Symposium on Information Assurance (ASIA), 2-6, 2015 | 9 | 2015 |
Experience matters: The role of vicarious experience in secure actions LA Mutchler, M Warkentin Journal of Database Management (JDM) 31 (2), 1-20, 2020 | 7 | 2020 |
Expanding protection motivation theory: The role of individual experience in information security policy compliance LA Mutchler Mississippi State University, 2012 | 6 | 2012 |
Teaching tip: Socio-cultural learning to increase student engagement in introduction to MIS AJ Connolly, LA Mutchler, DE Rush Journal of Information Systems Education 33 (2), 113, 2022 | 5 | 2022 |
Research in behavioral information security management M Warkentin, LA Mutchler Information systems and information technology (Computing Handbook Set 2, 2014 | 5 | 2014 |
A course plan for principles of IS programming to withstand COVID-19 AJ Connolly, LA Mutchler Communications of the Association for Information Systems 48 (1), 5, 2021 | 4 | 2021 |
Behavioral Information Security Management. M Warkentin, LA Mutchler Computing Handbook, 3rd ed.(2), 54:1-20, 2014 | 4 | 2014 |
Using role play to teach complexity in IT project management AJ Connolly, D Rush, L Mutchler | 2 | 2020 |
How Situational Theory of Publics Might Help Design Better InfoSec Messaging L Mutchler, A Connolly, R Syler | | 2023 |
How to Increase InfoSec Compliance by Matching the Messaging to the Right Users? LA Mutchler, AJ Connolly | | 2022 |
Marrying the Agile Framework with InfoSec Management Education. LA Mutchler, AJ Connolly, D Rush AMCIS, 2021 | | 2021 |
Mobile Apps: Motivational Influencers. LA Mutchler, JP Shim AMCIS, 2017 | | 2017 |