default search action
Alexandra Durcikova
Person information
- affiliation: The University of Oklahoma, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c45]Xinhui Zhan, Alexandra Durcikova, Dennis F. Galletta:
The Paradox of Choice: Digital Akrasia in the Deployment of Multi-Factor Authentication. HICSS 2024: 4774-4783 - [c44]Alexandra Durcikova, Ilona Ilvonen, Murray E. Jennex:
Introduction to the Minitrack on Securing Knowledge, Innovation, and Entrepreneurial Systems and Managing Knowledge Risks. HICSS 2024: 5501-5502 - [c43]Murray E. Jennex, Alexandra Durcikova, Ilona Ilvonen, Jeffry Babb:
Assessing and Mitigating the Risk of Critical Knowledge Loss in Organizations: Insights from COVID-19 and the Great Resignation. HICSS 2024: 5522-5531 - [c42]Bachazile L. Sikhondze, Alexandra Durcikova, Radhika Santhanam:
The Impact of Organizational Citizenship Behaviors on Technostress in a Post-COVID-19 Remote Work Context: The Role of Media Synchronicity. HICSS 2024: 6096-6106 - 2023
- [j24]Chuan (Annie) Tian, Matthew L. Jensen, Alexandra Durcikova:
Phishing susceptibility across industries: The differential impact of influence techniques. Comput. Secur. 135: 103487 (2023) - [j23]Dawei (David) Wang, Alexandra Durcikova, Alan R. Dennis:
Security is Local: The Influence of the Immediate Workgroup on Information Security. J. Assoc. Inf. Syst. 24(4): 4 (2023) - [c41]Ilona Ilvonen, Murray E. Jennex, Alexandra Durcikova:
Introduction to the Minitrack on Securing Knowledge, Innovation, and Entrepreneurial Systems and Managing Knowledge Risks. HICSS 2023: 4881 - 2022
- [j22]Matthew L. Jensen, Ryan T. Wright, Alexandra Durcikova, Shamya Karumbaiah:
Improving Phishing Reporting Using Security Gamification. J. Manag. Inf. Syst. 39(3): 793-823 (2022) - [c40]Murray E. Jennex, Alexandra Durcikova, Ilona Ilvonen:
Knowledge Systems and Risk Management: Threat Lessons Learned from COVID-19 in 2020-21. HICSS 2022: 1-10 - 2021
- [j21]Matthew L. Jensen, Alexandra Durcikova, Ryan T. Wright:
Using susceptibility claims to motivate behaviour change in IT security. Eur. J. Inf. Syst. 30(1): 27-45 (2021) - [j20]Christopher Nguyen, Matthew L. Jensen, Alexandra Durcikova, Ryan T. Wright:
A comparison of features in a crowdsourced phishing warning system. Inf. Syst. J. 31(3): 473-513 (2021) - [j19]Jeffrey L. Jenkins, Alexandra Durcikova, Jay F. Nunamaker Jr.:
Mitigating the Security Intention-Behavior Gap: The Moderating Role of Required Effort on the Intention-Behavior Relationship. J. Assoc. Inf. Syst. 22(1): 1 (2021) - [c39]Ilona Ilvonen, Alexandra Durcikova, Murray E. Jennex:
Introduction to the Minitrack on Securing Knowledge Systems and Managing Knowledge Risks. HICSS 2021: 1 - [c38]Rajendra Singh, Alexandra Durcikova, Lars Mathiassen:
Revenue Cycle Management in the Wake of EMR Implementation: A Competing Logics Perspective. HICSS 2021: 1-10 - 2020
- [c37]Alexandra Durcikova, Murray E. Jennex:
Introduction to the Minitrack on Security in Knowledge Systems and Knowledge Management. HICSS 2020: 1 - [c36]Murray E. Jennex, Alexandra Durcikova:
Knowledge Systems and Risk Management: Towards a Risk and Threat Assessment Framework. HICSS 2020: 1-10
2010 – 2019
- 2019
- [j18]Kent Marett, Ali Vedadi, Alexandra Durcikova:
A quantitative textual analysis of three types of threat communication and subsequent maladaptive responses. Comput. Secur. 80: 25-35 (2019) - [c35]Alexandra Durcikova, Murray E. Jennex:
Introduction to the Minitrack on Knowledge Management and Information Security. HICSS 2019: 1 - [c34]James Kelly, Murray E. Jennex, Kaveh Abhari, Alexandra Durcikova, Eric G. Frost:
Data in the Wild: A KM Approach to Doing a Census Without Asking Anyone and the Issue of Privacy. HICSS 2019: 1-10 - 2018
- [j17]Nicole Forsgren, Rajiv Sabherwal, Alexandra Durcikova:
Knowledge exchange roles and EKR performance impact: extending the theory of knowledge reuse. Eur. J. Inf. Syst. 27(1): 3-21 (2018) - [j16]Alexandra Durcikova, Allen S. Lee, Susan A. Brown:
Making Rigorous Research Relevant: Innovating Statistical Action Research. MIS Q. 42(1) (2018) - [c33]Alexandra Durcikova, Murray E. Jennex:
Introduction to the Minitrack on Knowledge Management and Information Security. HICSS 2018: 1-2 - 2017
- [c32]Alexandra Durcikova, Murray E. Jennex:
Introduction to Confidentiality, Integrity, and Availability of Knowledge and Data Minitrack. HICSS 2017: 1 - [c31]Matthew L. Jensen, Alexandra Durcikova, Ryan T. Wright:
Combating Phishing Attacks: A Knowledge Management Approach. HICSS 2017: 1-10 - 2016
- [j15]Nicole Forsgren, Alexandra Durcikova, Paul F. Clay, Xuequn Wang:
The Integrated User Satisfaction Model: Assessing Information Quality and System Quality as Second-order Constructs in System Administration. Commun. Assoc. Inf. Syst. 38: 39 (2016) - [j14]Alexandra Durcikova, Kelly J. Fadel:
Knowledge sourcing from repositories: The role of system characteristics and psychological climate. Inf. Manag. 53(1): 64-78 (2016) - [j13]Nicole Forsgren, Alexandra Durcikova, Robert J. Mills:
Examining System Administrators' Verification Information to Enhance IT Training Design. J. Comput. Inf. Syst. 56(4): 288-294 (2016) - [c30]Alexandra Durcikova, Murray E. Jennex:
Introduction to Confidentiality, Integrity, and Availability of Knowledge, Innovation, and Entrepreneurial Systems Minitrack. HICSS 2016: 4010 - 2015
- [c29]Alexandra Durcikova, Murray E. Jennex:
Introduction to Intellectual Property and Security Minitrack. HICSS 2015: 3929 - 2014
- [j12]Minnseok Choi, Alexandra Durcikova:
Are Printed Documents Becoming Irrelevant? The Role of Perceived Usefulness of Knowledge Repositories in Selecting From Knowledge Sources. Commun. Assoc. Inf. Syst. 34: 38 (2014) - [j11]Kelly J. Fadel, Alexandra Durcikova:
If it's fair, I'll share: The effect of perceived knowledge validation justice on contributions to an organizational knowledge repository. Inf. Manag. 51(5): 511-519 (2014) - [j10]Murray E. Jennex, Alexandra Durcikova:
Integrating IS Security with Knowledge Management: Are We Doing Enough? Int. J. Knowl. Manag. 10(2): 1-12 (2014) - [j9]Sabah Currim, Sudha Ram, Alexandra Durcikova, Faiz Currim:
Using a knowledge learning framework to predict errors in database design. Inf. Syst. 40: 11-31 (2014) - [c28]Justin Scott Giboney, David W. Wilson, Alexandra Durcikova:
An Individual's Views of the Right to Privacy of Other Individuals, Companies, and Governments: A Theoretical Perspective. AMCIS 2014 - [c27]Alexandra Durcikova, Murray E. Jennex:
Introduction to Knowledge Management and Security Minitrack. HICSS 2014: 3431 - [c26]Murray E. Jennex, Alexandra Durcikova:
Integrating IS Security with Knowledge Management: Are We Doing Enough to Thwart the Persistent Threat? HICSS 2014: 3452-3459 - [c25]Kelly J. Fadel, Alexandra Durcikova:
Enhancing the Motivation, Opportunity, and Ability of Knowledge Workers to Participate in Knowledge Exchange. HICSS 2014: 3605-3614 - 2013
- [j8]Jeffrey L. Jenkins, Alexandra Durcikova, Mary B. Burns:
Simplicity is Bliss: Controlling Extraneous Cognitive Load in Online Security Training to Promote Secure Behavior. J. Organ. End User Comput. 25(3): 52-66 (2013) - [c24]Alexandra Durcikova, Murray E. Jennex:
Introduction to KM and Security: Protecting Intellectual Property Minitrack. HICSS 2013: 3467 - [c23]Murray E. Jennex, Alexandra Durcikova:
Assessing Knowledge Loss Risk. HICSS 2013: 3478-3487 - [c22]Mary B. Burns, Alexandra Durcikova, Jeffrey L. Jenkins:
What Kind of Interventions Can Help Users from Falling for Phishing Attempts: A Research Proposal for Examining Stage-Appropriate Interventions. HICSS 2013: 4023-4032 - [c21]Jeffrey L. Jenkins, Alexandra Durcikova:
What, I Shouldn't Have Done That? : The Influence of Training and Just-in-Time Reminders on Secure Behavior. ICIS 2013 - 2012
- [j7]Scott McCoy, Hoon S. Cha, Alexandra Durcikova:
Modeling Internet Diffusion in Developing Countries. Australas. J. Inf. Syst. 17(2) (2012) - [c20]Srikar Velichety, Alexandra Durcikova:
Browser Update Practices in Households: Insights from Protection Motivation Theory and Customer Satisfaction. AMCIS 2012 - [c19]Jeffrey L. Jenkins, Alexandra Durcikova, Mary B. Burns:
Forget the Fluff: Examining How Media Richness Influences the Impact of Information Security Training on Secure Behavior. HICSS 2012: 3288-3296 - [c18]Alexandra Durcikova, Kelly J. Fadel:
It's Not "Just" Validation: The Effect of Organizational Justice on Contributions to a Knowledge Repository. HICSS 2012: 3959-3968 - [c17]Mary B. Burns, Alexandra Durcikova, Jeffrey L. Jenkins:
On Not Falling for Phish: Examining Multiple Stages of Protective Behavior of Information System End-Users. ICIS 2012 - 2011
- [j6]Shin-Yuan Hung, Alexandra Durcikova, Hui-Min Lai, Wan-Mei Lin:
The influence of intrinsic and extrinsic motivation on individuals' knowledge sharing behavior. Int. J. Hum. Comput. Stud. 69(6): 415-427 (2011) - [j5]Alexandra Durcikova, Kelly J. Fadel, Brian S. Butler, Dennis F. Galletta:
Research Note - Knowledge Exploration and Exploitation: The Impacts of Psychological Climate and Knowledge Management System Access. Inf. Syst. Res. 22(4): 855-866 (2011) - [c16]Jeffrey Gainer Proudfoot, Justin Scott Giboney, Ryan M. Schuetzler, Alexandra Durcikova:
Trends in Phishing Attacks: Suggestions for Future Research. AMCIS 2011 - [c15]Nicole F. Velasquez, Rajiv Sabherwal, Alexandra Durcikova:
Adoption of an Electronic Knowledge Repository: A Feature-Based Approach. HICSS 2011: 1-10 - [c14]Jeffrey L. Jenkins, Alexandra Durcikova, Mary B. Burns:
Get a Cue on IS Security Training: Explaining the Difference between how Security Cues and Security Arguments Improve Secure Behavior. ICIS 2011 - 2010
- [c13]Alexandra Durcikova, Kelly J. Fadel:
Knowledge Sourcing from Repositories: The Role of System Characteristics and Autonomy. HICSS 2010: 1-10 - [c12]Jeffrey L. Jenkins, Alexandra Durcikova, Grayson Ross, Jay F. Nunamaker Jr.:
Encouraging Users to Behave Securely: Examining the Influence of Technical, Managerial, and Educational Controls on Users' Secure Behavior. ICIS 2010: 150
2000 – 2009
- 2009
- [j4]Kelly J. Fadel, Alexandra Durcikova, Hoon S. Cha:
Information Influence in Mediated Knowledge Transfer: An Experimental Test of Elaboration Likelihood. Int. J. Knowl. Manag. 5(4): 26-42 (2009) - [j3]Alexandra Durcikova, Peter H. Gray:
How Knowledge Validation Processes Affect Knowledge Contribution. J. Manag. Inf. Syst. 25(4): 81-108 (2009) - [c11]Nicole F. Velasquez, Alexandra Durcikova, Rajiv Sabherwal:
Studying Knowledge Management System Success in System Administration. HICSS 2009: 1-7 - 2008
- [c10]Nicole F. Velasquez, Alexandra Durcikova:
Sysadmins and the need for verification information. CHIMIT 2008: 4 - [c9]Kelly J. Fadel, Alexandra Durcikova, Hoon S. Cha:
Elaboration Likelihood in Knowledge Management: A Model and Experimental Test. HICSS 2008: 359 - [c8]Nicole F. Velasquez, Suzanne P. Weisband, Alexandra Durcikova:
Designing Tools for System Administrators: An Empirical Test of the Integrated User Satisfaction Model. LISA 2008: 1-8 - 2007
- [c7]Alexandra Durcikova, Susan A. Brown:
Influence of System, Environment, and Procedures on Knowledge Submission Frequency. HICSS 2007: 192 - 2006
- [j2]Peter H. Gray, Alexandra Durcikova:
The Role of Knowledge Repositories in Technical Support Environments: Speed Versus Learning in User Performance. J. Manag. Inf. Syst. 22(3): 159-190 (2006) - [c6]Yiwen Zhang, Alexandra Durcikova, Susan A. Brown:
Knowledge Sourcing: A Channel Preference Perspective. AMCIS 2006: 218 - 2005
- [j1]Dennis F. Galletta, Alexandra Durcikova, Andrea Everard, Brian M. Jones:
Does spell-checking software need a warning label? Commun. ACM 48(7): 82-86 (2005) - [c5]Hoon S. Cha, Alexandra Durcikova, Scott McCoy:
Modeling Internet Diffusion in Developing Countries. AMCIS 2005: 259 - 2004
- [c4]Alexandra Durcikova, Dennis F. Galletta, Brian S. Butler:
The Role of Organizational Climate in the Use of Knowledge Management Systems to Support Problem Solving. AMCIS 2004: 266 - 2003
- [c3]Alexandra Durcikova, Iveta Stankovicova, Scott McCoy, Victor Mbarika:
Going Beyond TAM to Predict E-Mail Use in Eastern Europe: A Focus on the Slovak Republic. AMCIS 2003: 127 - [c2]Alexandra Durcikova:
The Role of Organizational Support for Creativity in Knowledge Management Systems. AMCIS 2003: 436 - [c1]Dennis F. Galletta, Alexandra Durcikova, Andrea Everard, Brian M. Jones:
Cognitive Fit and an Intelligent Agent for a Word Processor: Should Users Take All That Advice? HICSS 2003: 41 - 2002
- [p1]Pandu R. Tadikamalla, Alexandra Durcikova:
Statistical Models (Non-Optimization Models). Encyclopedia of Information Systems 2002: 227-241
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint