Most Popular Papers *
Centralization and Decentralization Decisions: Multiple Contingencies for IT Governance in the Public Sector
James S. Denford, Greg Dawson, and Kevin C. Desouza
Evaluating the Core and Full Protection Motivation Theory Nomologies for the Voluntary Adoption of Password Manager Applications
Salvatore Aurigemma, Thomas Mattson, and Lori N. K. Leonard
Replication Research of Moody, Siponen, and Pahnila’s Unified Model of Information Security Policy Compliance
Kristin Masuch, Sebastian Hengstler, Simon Trang, and Alfred Benedikt Brendel
Are All Internet Users’ Information Privacy Concerns (IUIPC) Created Equal?
Miaoyi Zeng, Shuaifu Lin, and Deborah Armstrong
A Replication Study of User Motivation in Protecting Information Security using Protection Motivation Theory and Self Determination Theory
Ning Yang, Tripti Singh, and Allen Johnston
A Replication of Beyond the Turk: Alternative Platforms for Crowdsourcing Behavioral Research – Sometimes Preferable to Student Groups
Troy L. Adams, Yuanxia Li, and Hao Liu
Towards a Greater Diversity of Replication Studies
Alfred Benedikt Brendel, R. Stefan Greulich, Fred Niederman, and Simon Thanh-Nam Trang
Consumer Acceptance of Personal Cloud: Integrating Trust and Risk with the Technology Acceptance Model
Murad A. Moqbel and Valerie L. Bartelt
* Based on the average number of full-text downloads per day since the paper was posted.
» Updated as of 03/05/21.