default search action
Joseph A. Cazier
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2021
- [j15]Max A. S. Rünzel, Edgar E. Hassler, Richard Rogers, Giovanni Formato, Joseph A. Cazier:
Designing a Smart Honey Supply Chain for Sustainable Development. IEEE Consumer Electron. Mag. 10(4): 69-78 (2021) - 2020
- [j14]Antonio Rafael Braga, Danielo G. Gomes, Richard Rogers, Edgar E. Hassler, Breno M. Freitas, Joseph A. Cazier:
A method for mining combined data from in-hive sensors, weather and apiary inspections to forecast the health status of honey bee colonies. Comput. Electron. Agric. 169: 105161 (2020) - [j13]Antonio Rafael Braga, Danielo G. Gomes, Breno M. Freitas, Joseph A. Cazier:
A cluster-classification method for accurate mining of seasonal honey bee patterns. Ecol. Informatics 59: 101107 (2020) - 2017
- [j12]Joseph A. Cazier, Benjamin B. M. Shao, Robert St. Louis:
Value Congruence, Trust, and Their Effects on Purchase Intention and Reservation Price. ACM Trans. Manag. Inf. Syst. 8(4): 13:1-13:28 (2017) - 2012
- [j11]Emily K. Smith, Joseph A. Cazier, Jerry Fox, Jeremiah M. Kitunda:
The effect of child labour in Africa on consumers of the cell phone industry. Int. J. Inf. Syst. Chang. Manag. 6(2): 147-159 (2012) - 2009
- [j10]Joseph A. Cazier, B. Dawn Medlin, Antonina Durfee:
Investigating Task Completion for a Complicated Online Travel Search. J. Inf. Technol. Tour. 11(1): 43-50 (2009) - 2008
- [j9]Joseph A. Cazier, Andrew Jensen, Dinesh S. Dave:
The Impact of Consumer Perceptions of Information Privacy and Security Risks on the Adoption of Residual RFID Technologies. Commun. Assoc. Inf. Syst. 23: 14 (2008) - [j8]B. Dawn Medlin, Joseph A. Cazier, Daniel P. Foulk:
Analyzing the Vulnerability of U.S. Hospitals to Social Engineering Attacks: How Many of Your Employees Would Share Their Password? Int. J. Inf. Secur. Priv. 2(3): 71-83 (2008) - [j7]E. Vance Wilson, David D. Dobrzykowski, Joseph A. Cazier:
The Influence of Media Trust and Internet Trust on Privacy-Risking Uses of E-Health. Int. J. Inf. Secur. Priv. 2(3): 84-97 (2008) - 2007
- [j6]B. Dawn Medlin, Joseph A. Cazier:
An Empirical Investigation: Health Care Employee Passwords and Their Crack Times in Relationship to HIPAA Security Standards. Int. J. Heal. Inf. Syst. Informatics 2(3): 39-48 (2007) - [j5]Joseph A. Cazier, E. Vance Wilson, B. Dawn Medlin:
The Role of Privacy Risk in IT Acceptance: An Empirical Study. Int. J. Inf. Secur. Priv. 1(2): 61-73 (2007) - [j4]Antonina Durfee, B. Dawn Medlin, Joseph A. Cazier:
User characteristics for overcoming bias and intrigue in travel searches. Int. J. Netw. Virtual Organisations 4(1): 76-91 (2007) - [j3]Joseph A. Cazier, Benjamin B. M. Shao, Robert D. St. Louis:
Sharing information and building trust through value congruence. Inf. Syst. Frontiers 9(5): 515-529 (2007) - 2006
- [j2]Joseph A. Cazier, Benjamin B. M. Shao, Robert D. St. Louis:
E-business differentiation through value-based trust. Inf. Manag. 43(6): 718-727 (2006) - [j1]Joseph A. Cazier, B. Dawn Medlin:
Password Security: An Empirical Investigation into E-Commerce Passwords and Their Crack Times. Inf. Secur. J. A Glob. Perspect. 15(6): 45-55 (2006)
Conference and Workshop Papers
- 2019
- [c19]Antonio Rafael Braga, Edgar E. Hassler, Danielo G. Gomes, Breno M. Freitas, Joseph A. Cazier:
IoT for Development: Building a Classification Algorithm to Help Beekeepers Detect Honeybee Health Problems Early. AMCIS 2019 - 2017
- [c18]Mark Jacobs, Joseph A. Cazier, James T. Wilkes, Richard Rogers, Edgar E. Hassler:
Building a Business Analytics Platform for Enhancing Commercial Beekeepers' Performance: Descriptive Validation of a Data Framework for Widespread Adoption By Citizen Scientists. AMCIS 2017 - 2016
- [c17]Ethan Walton, Mark Jacobs, James T. Wilkes, Joseph A. Cazier:
Building a Business Analytics Platform For Enhancing Commercial Beekeepers' Performance. AMCIS 2016 - [c16]Joseph A. Cazier, Jennifer A. Green:
Life Coach: Using Big Data and Analytics to Facilitate the Attainment of Life Goals. HICSS 2016: 1000-1008 - [c15]James A. Westwood, Joseph A. Cazier:
Work-Life Optimization: Using Big Data and Analytics to Facilitate Work-Life Balance. HICSS 2016: 1701-1709 - 2015
- [c14]Shawn Bergman, Joseph A. Cazier, Jonathan Powers:
Analytics for Good: Predicting Secondary Education Attainment with Text Analytics. AMCIS 2015 - [c13]Joseph A. Cazier, Thomas Cech, Trent J. Spaulding:
Applying Business Analytic Methods To Improve Organizational Performance In The Public School System. AMCIS 2015 - 2012
- [c12]John Corley, Joseph A. Cazier, Sandra A. Vannoy:
The Influence of General Sustainability Attitudes and Value Congruence on Consumer Behavior. AMCIS 2012 - 2011
- [c11]Libor Cech, Joseph A. Cazier, Brandy E. Hopkins:
Business Process: Automation And Optimization Considerations In Hardwood Lumber Manufacturing. AMCIS 2011 - [c10]Emily K. Smith, Joseph A. Cazier, Jeremy B. Fox:
Talking On Your Cell Phone and Ethical Responsibility: How Many Children Died for Your Battery? AMCIS 2011 - 2010
- [c9]Robert D. St. Louis, Joseph A. Cazier:
Green Business and Online Price Premiums: Will Consumers Pay More to Purchase from Environmentally Friendly Technology Companies? AMCIS 2010: 224 - 2007
- [c8]Michael Sheridan, Joseph A. Cazier, Douglas May:
The Roles of Positive and Negative Utility in Predicting Online Wine Purchase Behavior. AMCIS 2007: 122 - [c7]Andrew Jensen, Joseph A. Cazier, Dinesh S. Dave:
The Impact of Government Trust Perception on Privacy Risk Perceptions and Consumer Acceptance Of Residual RFID Technologies. AMCIS 2007: 146 - [c6]Joseph A. Cazier, Antonina Durfee, B. Dawn Medlin:
An Exploration of Antecedent Characteristics for Predicting User Perseverance in Online Travel Shopping. AMCIS 2007: 167 - 2006
- [c5]Joseph A. Cazier, E. Vance Wilson, B. Dawn Medlin:
The Role of Privacy Risk in IT Acceptance: An Empirical Study. AMCIS 2006: 119 - [c4]Antonina Durfee, B. Dawn Medlin, Joseph A. Cazier:
Bias and Intrigue in Internet Searches: Do You Have the Patience and Skill to Find What You Need? AMCIS 2006: 343 - 2005
- [c3]Joseph A. Cazier:
A Framework and Model for Understanding the Creation and Sources of Trust. AMCIS 2005: 24 - [c2]B. Dawn Medlin, Joseph A. Cazier, Dinesh S. Dave:
Password Selection by End Users from an eCommerce Site: An Empirical Study. AMCIS 2005: 447 - 2003
- [c1]Joseph A. Cazier, Benjamin B. M. Shao, Robert St. Louis:
Addressing E-Business Privacy Concerns: The Roles of Trust and Value Compatibility. SAC 2003: 617-622
Reference Works
- 2007
- [r1]Joseph A. Cazier, Ryan C. LaBrie:
Ethical Dilemmas in Data Mining and Warehousing. Encyclopedia of Information Ethics and Security 2007: 221-228
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:57 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint