User motivations in protecting information security: Protection motivation theory versus self-determination theory P Menard, GJ Bott, RE Crossler Journal of Management Information Systems 34 (4), 1203-1230, 2017 | 361 | 2017 |
Who to trust? Applying trust to social commerce S Sharma, P Menard, LA Mutchler Journal of Computer Information Systems 59 (1), 32-42, 2019 | 184 | 2019 |
The impact of collectivism and psychological ownership on protection motivation: A cross-cultural examination P Menard, M Warkentin, PB Lowry Computers & Security 75, 147-166, 2018 | 124 | 2018 |
Shared benefits and information privacy: what determines smart meter technology adoption? M Warkentin, S Goel, P Menard Journal of the Association for Information Systems 18 (11), 3, 2017 | 102 | 2017 |
Becoming a blockchain user: understanding consumers’ benefits realisation to use blockchain-based applications N Raddatz, J Coyne, P Menard, RE Crossler European Journal of Information Systems 32 (2), 287-314, 2023 | 71 | 2023 |
Analyzing IOT users’ mobile device privacy concerns: Extracting privacy permissions using a disclosure experiment P Menard, GJ Bott Computers & Security 95, 101856, 2020 | 57* | 2020 |
Threat protection and convenience: Antecedents of cloud-based data backup P Menard, R Gatlin, M Warkentin Journal of Computer Information Systems 55 (1), 83-91, 2014 | 57 | 2014 |
Cultivating cybersecurity learning: An integration of self-determination and flow HJ Kam, P Menard, D Ormond, RE Crossler Computers & Security 96, 101875, 2020 | 53* | 2020 |
Espoused cultural values as antecedents of individuals’ threat and coping appraisal toward protective information technologies: Study of US and Ghana RE Crossler, FK Andoh-Baidoo, P Menard Information & Management 56 (5), 754-766, 2019 | 46 | 2019 |
That's interesting: An examination of interest theory and self‐determination in organisational cybersecurity training HJ Kam, DK Ormond, P Menard, RE Crossler Information Systems Journal 32 (4), 888-926, 2022 | 24 | 2022 |
Integrating truth bias and elaboration likelihood to understand how political polarisation impacts disinformation engagement on social media S Miller, P Menard, D Bourrie, S Sittig Information Systems Journal 34 (3), 642-679, 2024 | 19 | 2024 |
Uncertainty, personality, and attitudes toward DevOps J Shropshire, P Menard, B Sweeney | 17 | 2017 |
An examination of gain-and loss-framed messaging on smart home security training programs M Plachkinova, P Menard Information Systems Frontiers, 1-22, 2022 | 5 | 2022 |
Individual transportation decisions under conditions of risk and uncertainty L Strawderman, DW Carruth, K Sherman-Morris, P Menard, M Warkentin, ... Natural hazards 92, 927-942, 2018 | 4 | 2018 |
mHealth Cross-Contamination of User Health Data: Android Platform Analysis AH McGowan, S Sittig, P Menard | 3 | 2019 |
Training Wheels: A New Approach to Teaching Mobile Device Security P Menard, J Shropshire | 3 | 2016 |
The influence of self-determined motivation on security education training and awareness (SETA) programs PR Menard Mississippi State University, 2015 | 2 | 2015 |
A new approach to mobile device authentication J Shropshire, P Menard | 2 | 2015 |
I'm not fluent: How linguistic fluency, new media literacy, and personality traits influence fake news engagement behavior on social media S Miller, P Menard, D Bourrie Information & Management 61 (2), 103912, 2024 | 1 | 2024 |
Proposing SETA program design based on employee motivational fit P Menard | 1 | 2016 |