default search action
Mark B. Schmidt
Person information
- affiliation: St. Cloud State University, Information Systems Department
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2015
- [c12]Aaron M. French, Chengqi Guo, Mark B. Schmidt, Jung P. Shim:
An Exploratory Study on BYOD in Class: Opportunities and Concerns. AMCIS 2015 - 2012
- [j13]Michael Brian Pope, Merrill Warkentin, Ernst Bekkering, Mark B. Schmidt:
Digital Steganography - An Introduction to Techniques and Tools. Commun. Assoc. Inf. Syst. 30: 22 (2012) - [j12]Dien D. Phan, Mark B. Schmidt, Lawrence Roth:
Natural intelligence applications for business intelligence in online and catalogue retailing firms: a case study. Int. J. Inf. Syst. Chang. Manag. 6(1): 68-83 (2012) - 2010
- [j11]Dien D. Phan, Mark B. Schmidt, Jim Q. Chen:
Organizational Ecology Success Factors in the Business: A Case Study at Fingerhut Inc. Inf. Syst. Manag. 27(1): 82-91 (2010)
2000 – 2009
- 2009
- [j10]Ernst Bekkering, Allen C. Johnston, Merrill Warkentin, Mark B. Schmidt:
An Empirical Assessment of Technology Adoption as a Choice between Alternatives. Inf. Resour. Manag. J. 22(4): 23-44 (2009) - [j9]Gary F. Templeton, Mark B. Schmidt, G. Stephen Taylor:
Managing the diffusion of organizational learning behavior. Inf. Syst. Frontiers 11(2): 189-200 (2009) - [c11]Olivia F. Lee, Dennis C. Guster, Mark B. Schmidt:
A First Approach in the Assessment of the Complexity of Disaster Recovery Models for SMEs. AMCIS 2009: 536 - [c10]Mark B. Schmidt, James E. Weber, Nancy Van Erp, Michele Mumm:
Assessing Student Interest in Hybrid Course Delivery at the MBA Level. AMCIS 2009: 617 - [c9]Dien D. Phan, Mark B. Schmidt:
Business Intelligence Successes at a Catalog and Online Retailer. ICNC (3) 2009: 219-223 - 2008
- [j8]Jim Q. Chen, Mark B. Schmidt, Dien D. Phan, Kirk P. Arnett:
E-commerce security threats: awareness, trust and practice. Int. J. Inf. Syst. Chang. Manag. 3(1): 16-32 (2008) - [j7]James E. Weber, Dennis C. Guster, Paul Safonov, Mark B. Schmidt:
Weak Password Security: An Empirical Study. Inf. Secur. J. A Glob. Perspect. 17(1): 45-54 (2008) - [j6]Merrill Warkentin, Ernst Bekkering, Mark B. Schmidt:
Steganography: Forensic, Security, and Legal Issues. J. Digit. Forensics Secur. Law 3(2): 17-34 (2008) - [j5]Mark B. Schmidt, Allen C. Johnston, Kirk P. Arnett, Jim Q. Chen, Suichen Li:
A Cross-Cultural Comparison of U.S. and Chinese Computer Security Awareness. J. Glob. Inf. Manag. 16(2): 91-103 (2008) - 2007
- [j4]Kirk P. Arnett, Mark B. Schmidt, Allen C. Johnston, Jongki Kim, Hajin Hwang:
Rootkits and What we Know: Assessing US and Korean Knowledge and Perceptions. Int. J. Inf. Secur. Priv. 1(4): 75-86 (2007) - [c8]Mark B. Schmidt, Kirk P. Arnett:
Synthesis and Analysis of Moore and Benbasat's PCI and Witte's Susceptibility and Severity of Threat Scales. AMCIS 2007: 196 - [c7]Mark B. Schmidt, Jim Q. Chen, Dien D. Phan, Kirk P. Arnett:
Comparing Security Perceptions of E-Commerce Users. AMCIS 2007: 288 - [r1]Reggie Becker, Mark B. Schmidt, Allen C. Johnston:
Mitigation of Identity Theft in the Information Age. Encyclopedia of Information Ethics and Security 2007: 451-456 - 2006
- [c6]Jordan Shropshire, Merrill Warkentin, Allen C. Johnston, Mark B. Schmidt:
Personality and IT security: An application of the five-factor model. AMCIS 2006: 415 - 2005
- [j3]Mark B. Schmidt, Kirk P. Arnett:
Spyware: a little knowledge is a wonderful thing. Commun. ACM 48(8): 67-70 (2005) - [j2]Kirk P. Arnett, Mark B. Schmidt:
Busting the ghost in the machine. Commun. ACM 48(8): 92-95 (2005) - [c5]Kirk P. Arnett, Mark B. Schmidt, Jung P. Shim:
Tablet PCs for Teaching Information Systems Courses. AMCIS 2005: 242 - 2004
- [c4]Jung P. Shim, Kirk P. Arnett, Mark B. Schmidt:
Videostreaming, HorizonLive, and Tablet PCs for Teaching Information Systems Courses: Revisited. AMCIS 2004: 11 - [c3]Mark B. Schmidt, Allen C. Johnston, Kirk P. Arnett:
Wireless Network Security in Hospitality SMEs. AMCIS 2004: 51 - [c2]Mark B. Schmidt, David Vance:
IT Does Matter (At Least When It Is Properly Managed). AMCIS 2004: 126 - 2003
- [c1]Jung P. Shim, Kirk P. Arnett, Mark B. Schmidt:
Using Streaming Technology and Tablet PCs for Teaching Information Systems. AMCIS 2003: 417 - 2001
- [j1]James E. Weber, Vicky J. McIntyre, Mark B. Schmidt:
Explaining is Student and is Industry Differences in Perceptions of Skill Importance. J. Comput. Inf. Syst. 41(4): 79-83 (2001)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:09 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint