ติดตาม
Hwee-Joo Kam, D.Sc., CISSP
Hwee-Joo Kam, D.Sc., CISSP
Associate Professor of Cybersecurity, University of Tampa
ยืนยันอีเมลแล้วที่ ut.edu - หน้าแรก
ชื่อ
อ้างโดย
อ้างโดย
ปี
Structural model of team-based learning using Web 2.0 collaborative software
HJ Kam, P Katerattanakul
Computers & Education 76, 1-12, 2014
63*2014
Information security in higher education: A neo-institutional perspective
HJ Kam, P Katerattanakul
Journal of Information Privacy and Security 10 (1), 28-43, 2014
52*2014
Cultivating cybersecurity learning: An integration of self-determination and flow
HJ Kam, P Menard, D Ormond, RE Crossler
Computers & Security 96, 101875, 2020
48*2020
Enhancing student learning in cybersecurity education using an out-of-class learning approach
HJ Kam, P Katerattanakul
Journal of Information Technology Education. Innovations in Practice 18, 29, 2019
31*2019
A cross industry study of institutional pressures on organizational effort to raise information security awareness
HJ Kam, T Mattson, S Goel
Information Systems Frontiers 22 (5), 1241-1264, 2020
30*2020
That's interesting: An examination of interest theory and self‐determination in organisational cybersecurity training
HJ Kam, DK Ormond, P Menard, RE Crossler
Information Systems Journal 32 (4), 888-926, 2022
192022
The effects of web accessibility certification on the perception of companies’ corporate social responsibility
P Katerattanakul, S Hong, HM Lee, HJ Kam
Universal Access in the Information Society 17, 161-173, 2018
142018
IT Governance framework: one size fits all?
HJ Kam, P Katerattanakul, SG Hong
AMCIS, 2016
112016
A tale of two cities: Information security policy compliance of the banking industry in the United States and South Korea
HJ Kam, P Katerattanakul, SG Hong
The European Conference on Information Systems (ECIS), 2015
11*2015
E-Healthcare in ABC County Health Department (ABCCHD)1: Trade-offs Analysis and Evaluation
K Siau, HJ Kam
Journal of Information Technology 21 (1), 66-71, 2006
82006
Improving Cybersecurity Learning: An Integration of Cyber Offense and Cyber Defense
HJ Kam, Y Shang
2019 PACIS Proceeding, 2019
72019
Playing online games on Facebook: The conscious and unconscious learning in database design
HJ Kam, G Gogolin, D Blakemore, G Emerick
2013 IEEE Frontiers in Education Conference (FIE), 514-516, 2013
62013
Diversifying cybersecurity education: A non-technical approach to technical studies
HJ Kam, P Katerattanakul
2014 IEEE Frontiers in Education Conference (FIE) Proceedings, 1-4, 2014
52014
Work in progress—web penetration testing: effectiveness of student learning in Web application security
HJ Kam, JJ Pauli
2011 Frontiers in Education Conference (FIE), F3G-1-F3G-3, 2011
52011
Effect of business characteristics and ERP implementation strategies on ERP outcomes: An exploratory study
P Katerattanakul, JJ Lee, S Hong, HJ Kam
32009
A Role Theory Perspective: Will Shifting Left Become a Pain for Application Developers?
HJ Kam, J D'Arcy
Pre-ICIS Workshop on Information Security and Privacy (SIGSEC), 2022
22022
Should we wear a velvet glove to enforce Information security policies in higher education?
HJ Kam, DJ Kim, W He
Behaviour & Information Technology 41 (10), 1-15, 2022
22022
Bridging the Security Gap between Software Developers and Penetration Testers: A Job Characteristic Theory Perspective.
HJ Kam, V Shah, SM Ho
AMCIS, 2017
22017
Teaching Case: Migrating Legacy Systems in the Global Merger & Acquisition Environment
P Katerattanakul, HJ Kam, JJ Lee, S Hong
Journal of Information Systems Education 20 (3), 281, 2009
2*2009
The “Right” recipes for security culture: a competing values model perspective
HJ Kam, T Mattson, DJ Kim
Information Technology & People 34 (5), 1490-1512, 2021
12021
ระบบไม่สามารถดำเนินการได้ในขณะนี้ โปรดลองใหม่อีกครั้งในภายหลัง
บทความ 1–20