Defining and identifying disruptive innovations D Nagy, J Schuessler, A Dubinsky Industrial marketing management 57, 119-126, 2016 | 430 | 2016 |
General Deterrence Theory: Assessing Information Systems Security Effectiveness in Large versus Small Businesses JH Schuessler ProQuest, 183, 2009 | 37 | 2009 |
Pre-Employment Screening for Security Risk: An Exploratory Study JH Schuessler, DM Hite Journal of Applied Business and Economics 16 (1), 2014 | 8 | 2014 |
“Chunking” Semester Projects: Does it Enhance Student Learning? JH Schuessler Journal of Higher Education Theory and Practice 17 (7), 2017 | 7 | 2017 |
Work ethic and information security behavior T Ramakrishnan, DM Hite, JH Schuessler, V Prybutok Information & Computer Security 30 (3), 364-381, 2022 | 5 | 2022 |
Data breach Laws: do they work? JH Schuessler, D Nagy, HK Fulk, A Dearing Journal of Applied Security Research 12 (4), 512-524, 2017 | 5 | 2017 |
Web Scraping to Inform Curriculum Decisions JS Norcross, JH Schuessler, DG Jones Journal of Higher Education Theory and Practice 20 (10), 2020 | 3 | 2020 |
Systems Security Effectiveness in Large versus Small Businesses JH Schuessler, J Windsor, A Wu Journal of Information System Security 10 (1), 2015 | 3* | 2015 |
Web scraping to inform curriculum decisions: An exploratory study J Schuessler, D Jones | 2 | 2018 |
Contemporary Threats and Countermeasures: A Security Evaluation JH Schuessler Journal of Information Privacy & Security 9 (2), 18, 2013 | 2* | 2013 |
Threats and Countermeasures of the Realm in 2011 JH Schuessler Southwest Decision Sciences Forty-Third Annual Meeting, 9, 2012 | 2 | 2012 |
An information systems security framework J Schuessler AMCIS 2007 Proceedings, 304, 2007 | 2 | 2007 |
Portable Privacy: Mobile Device Adoption JH Schuessler, B Ibragimova Annual Security Conference. Retrieved from www. securityconference. org …, 2009 | 1 | 2009 |
Hacking Framework Extended: The Role of Vulnerabilities JH Schuessler, B Ibragimova Retrieved 10/18/2012 from http://joseph. schuesslersounds. com/Research …, 2009 | 1 | 2009 |
Understanding Enterprise System Innovation: A Belief, Action, Outcome Proposal D Nagy, J Schuessler, HK Fulk, C Holton Southwest Decision Sciences Institute, 2015, 2015 | | 2015 |
Data Breach Laws: Do They Work? An Exploratory Study J Schuessler, D Nagy, A Dearing, HK Fulk Southwest Decision Sciences Institutes, 2015, 2015 | | 2015 |
Defining and Predicting Disruptive Innovations D Nagy, J Schuessler 2014 Annual Meeting of the Decision Sciences Institute, 2014 | | 2014 |
Cognitive Ability, Personal Computer Security Posture, and Employability: An Exploratory Study J Schuessler, T Ramakrishnan Decision Sciences Institute's Annual Conference, 2014 | | 2014 |
Information Systems Security: Developing a Stage Theory JH Schuessler Southwest Decision Sciences Forty-Second Annual Meeting, 9, 2011 | | 2011 |
DECISION SCIENCES INSTITUTE D Nagy, J Schuessler | | |