default search action
Jordan Shropshire
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j12]Ali Vedadi, Merrill Warkentin, Detmar W. Straub, Jordan Shropshire:
Fostering information security compliance as organizational citizenship behavior. Inf. Manag. 61(5): 103968 (2024) - 2021
- [j11]Dustin Mink, Jeffrey Todd McDonald, Sikha Bagui, William Bradley Glisson, Jordan Shropshire, Ryan Benton, Samuel H. Russ:
Near-Real-Time IDS for the U.S. FAA's NextGen ADS-B. Big Data Cogn. Comput. 5(2): 27 (2021) - 2017
- [j10]Matthew Campbell, Jordan Shropshire, Antonis C. Stylianou:
A stitch in time saves nine: the role of moral judgement in reducing internet policy violations. Int. J. Bus. Inf. Syst. 24(3): 369-386 (2017) - [j9]Jordan Shropshire, Art Gowan:
Identifying Traits and Values of Top-Performing Information Security Personnel. J. Comput. Inf. Syst. 57(3): 258-268 (2017) - 2016
- [j8]Merrill Warkentin, Allen C. Johnston, Jordan Shropshire, William D. Barnett:
Continuance of protective security behavior: A longitudinal study. Decis. Support Syst. 92: 25-35 (2016) - 2015
- [j7]Jordan Shropshire, Merrill Warkentin, Shwadhin Sharma:
Personality, attitudes, and intentions: Predicting initial adoption of information security behavior. Comput. Secur. 49: 177-191 (2015) - 2012
- [j6]Cheryl Aasheim, Jordan Shropshire, Lixin Li, Christopher Kadlec:
Knowledge and Skill Requirements for Entry-Level IT Workers: A Longitudinal Study. J. Inf. Syst. Educ. 23(2): 193-204 (2012) - 2011
- [j5]Merrill Warkentin, Allen C. Johnston, Jordan Shropshire:
The influence of the informal social learning environment on information privacy policy compliance efficacy and intention. Eur. J. Inf. Syst. 20(3): 267-284 (2011) - 2010
- [j4]Jordan Shropshire, Christopher Kadlec:
The Relationship between IT Director Values and Extent of IT Disaster Recovery Planning in the Banking Industry. Int. J. Inf. Syst. Crisis Response Manag. 2(2): 54-68 (2010) - [j3]Jordan Shropshire, Merrill Warkentin, Allen C. Johnston:
Impact of Negative Message Framing on Security Adoption. J. Comput. Inf. Syst. 51(1): 41-51 (2010) - 2009
- [j2]Jordan Shropshire:
A canonical analysis of intentional information security breaches by insiders. Inf. Manag. Comput. Secur. 17(4): 296-310 (2009) - 2007
- [j1]Jung P. Shim, Jordan Shropshire, Sungmin Park, Howard J. Harris, Natalie Campbell:
Podcasting for e-learning, communication, and delivery. Ind. Manag. Data Syst. 107(4): 587-600 (2007)
Conference and Workshop Papers
- 2024
- [c21]Jordan Shropshire, Maureen Van Devender:
Analyzing Risks to Internal Developer Platforms. AMCIS 2024 - [c20]Jordan Shropshire, Todd McDonald:
Assessing the Integrity of Mobile Platform-Based Sensor Data Pipelines. ISDFS 2024: 1-6 - 2021
- [c19]Thomas Watts, Ryan Benton, Jordan Shropshire, David Bourrie:
Insight from a Containerized Kubernetes Workload Introspection. HICSS 2021: 1-10 - 2020
- [c18]Steven Presley, Jordan Shropshire, Jeffrey P. Landry:
Assessing Cybersecurity Risk in the Extended Project Lifespan: A Pilot Study. AMCIS 2020 - [c17]Jordan Shropshire, Ryan Benton:
Container and VM Visualization for Rapid Forensic Analysis. HICSS 2020: 1-10 - 2019
- [c16]Thomas Watts, Ryan Benton, William Bradley Glisson, Jordan Shropshire:
Insight from a Docker Container Introspection. HICSS 2019: 1-10 - 2018
- [c15]Steven Presley, Jeffrey P. Landry, Jordan Shropshire:
Cybersecurity Threats in the Context of Project Meta-Phases. AMCIS 2018 - [c14]Jordan Shropshire, Jeffrey P. Landry, Steven Presley:
Development of a Metric for Assessing Full-Stack Developers' Expertise. AMCIS 2018 - 2017
- [c13]Jordan Shropshire, Philip Menard, Bob Sweeney:
Uncertainty, Personality, and Attitudes toward DevOps. AMCIS 2017 - [c12]Joel A. Dawson, Jeffrey Todd McDonald, Jordan Shropshire, Todd R. Andel, Patrick Luckett, Lee M. Hively:
Rootkit detection through phase-space analysis of power voltage measurements. MALWARE 2017: 19-27 - 2016
- [c11]Jordan Shropshire, Art Gowan, Chengqi Guo:
Defining Audience Awareness for Information Systems Research. CPR 2016: 77-82 - 2015
- [c10]Jordan Shropshire:
Strategies for Ensuring High Availability Cloud Services. AMCIS 2015 - [c9]Jordan Shropshire, Art Gowan:
Characterizing the Traits of Top-Performing Security Personnel. CPR 2015: 55-59 - 2014
- [c8]Jordan Shropshire:
Extending the Cloud with Fog: Security Challenges & Opportunities. AMCIS 2014 - [c7]Jordan Shropshire:
Analysis of Monolithic and Microkernel Architectures: Towards Secure Hypervisor Design. HICSS 2014: 5008-5017 - 2013
- [c6]Jordan Shropshire, Jack A. Gowan:
A Measure for Assessing the Adequacy of DDOS Defenses. AMCIS 2013 - [c5]Louis Turnbull, Henry Ochieng, Chris Kadlec, Jordan Shropshire:
Improving service continuity: IT disaster prevention and mitigation for data centers. RIIT 2013: 43-46 - 2009
- [c4]Christopher Kadlec, Jordan Shropshire:
Establishing the IT Disaster Recovery Planning Construct. AMCIS 2009: 639 - 2007
- [c3]Merrill Warkentin, Jordan Shropshire, Allen C. Johnston:
The IT Security Adoption Conundrum: An Initial Step Toward Validation of Applicable Measures. AMCIS 2007: 276 - 2006
- [c2]Jung P. Shim, Jordan Shropshire, Sungmin Park, Howard J. Harris, Natalie Campbell:
Perceived Value of Podcasting: Student Communication-Medium Preferences. AMCIS 2006: 271 - [c1]Jordan Shropshire, Merrill Warkentin, Allen C. Johnston, Mark B. Schmidt:
Personality and IT security: An application of the five-factor model. AMCIS 2006: 415
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-23 21:01 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint