User's willingness to pay on social network sites BO Han, J Windsor Journal of computer information systems 51 (4), 31-40, 2011 | 242 | 2011 |
Ethical decision making: A comparison of computer-supported and face-to-face group JJ Cappel, JC Windsor Journal of Business Ethics 28, 95-107, 2000 | 99 | 2000 |
Knowledge management and the creation of business value M Mousavizadeh, S Ryan, G Harden, J Windsor Journal of Computer Information Systems 55 (4), 35-45, 2015 | 84 | 2015 |
Organizational practices that foster knowledge sharing: Validation across distinct national cultures SD Ryan, JC Windsor, B Ibragimova, VR Prybutok Informing Science 13, 139, 2010 | 84 | 2010 |
Understanding the antecedents of knowledge sharing: An organizational justice perspective B Ibragimova, SD Ryan, JC Windsor, VR Prybutok Informing Science 15, 183, 2012 | 77 | 2012 |
Building a knowledge base for MIS research: A meta-analysis of a systems success model MI Hwang, JC Windsor, A Pryor Information Resources Management Journal (IRMJ) 13 (2), 26-32, 2000 | 70 | 2000 |
An investigation of the smartphone user's in–game purchase intention B Han, J Windsor International Journal of Mobile Communications 11 (6), 617-635, 2013 | 53 | 2013 |
User's adoption of free third-party security apps B Han, YA Wu, J Windsor Journal of Computer Information Systems 54 (3), 77-86, 2014 | 48 | 2014 |
A comparative investigation of ethical decision making: Information systems professionals versus students JJ Cappel, JC Windsor ACM SIGMIS Database: the DATABASE for Advances in Information Systems 29 (2 …, 1998 | 48 | 1998 |
Risks and effects of IS/IT outsourcing: a securities market assessment DA Peak, JC Windsor, C James Journal of Information Technology Case and Application Research 4 (1), 6-33, 2002 | 46 | 2002 |
Definition and multidimensionality of security awareness: Close encounters of the second order B Hanus, JC Windsor, Y Wu ACM SIGMIS Database: the DATABASE for Advances in Information Systems 49 (SI …, 2018 | 37 | 2018 |
A comparative study of moral reasoning JC WINDSOR, JJ CAPPEL College Student Journal 33 (2), 281-281, 1999 | 36 | 1999 |
Empirical evaluation of information security planning and integration RF Young, J Windsor Communications of the Association for Information Systems 26 (1), 13, 2010 | 34 | 2010 |
Factors affecting the adoption of knowledge management technologies: An international perspective SD Ryan, GR Abitia, JC Windsor AMCIS 2000 proceedings, 197, 2000 | 34 | 2000 |
An empirical assessment of a multimedia executive support system AH Huang, JC Windsor Information & Management 33 (5), 251-262, 1998 | 34 | 1998 |
Influence of social context and affect on individuals' implementation of information security safeguards Y Wu ICIS 2009 Proceedings, 70, 2009 | 23 | 2009 |
Security awareness programs CS Guynes, J Windsor The Review of Business Information Systems (Online) 16 (4), 165, 2012 | 21 | 2012 |
Maintaining quality in information systems TL Fox, CS Guynes, VR Prybutok, J Windsor Journal of Computer Information Systems 40 (1), 76-80, 1999 | 20 | 1999 |
Determinants of software volatility: a field study X Zhang, J Windsor, R Pavur Journal of Software Maintenance and Evolution: Research and Practice 15 (3 …, 2003 | 15 | 2003 |
E-commerce/network security considerations CS Guynes, YA Wu, J Windsor International Journal of Management & Information Systems (IJMIS) 15 (2), 1-8, 2011 | 12 | 2011 |