Scott R. Boss
Scott R. Boss
Verified email at bentley.edu
Title
Cited by
Cited by
Year
If someone is watching, I'll do what I'm asked: mandatoriness, control, and information security
SR Boss, LJ Kirsch, I Angermeier, RA Shingler, RW Boss
European Journal of Information Systems 18 (2), 151-164, 2009
5012009
What do systems users have to fear? Using fear appeals to engender threats and fear that motivate protective security behaviors
SR Boss, DF Galletta, PB Lowry, GD Moody, P Polak
MIS quarterly 39 (4), 837-864, 2015
4812015
The last line of defense: motivating employees to follow corporate security guidelines
L Kirsch, S Boss
ICIS 2007 proceedings, 103, 2007
105*2007
The last line of defense: motivating employees to follow corporate security guidelines
L Kirsch, S Boss
ICIS 2007 proceedings, 103, 2007
842007
Friends don't make friends good citizens, but advisors do
TJ Zagenczyk, R Gibney, AJ Murrell, SR Boss
Group & Organization Management 33 (6), 760-780, 2008
672008
Factors associated with IT audits by the internal audit function
MJ Abdolmohammadi, SR Boss
International Journal of Accounting Information Systems 11 (3), 140-151, 2010
552010
Control, perceived risk and information security precautions: External and internal motivations for security behavior
SR Boss
University of Pittsburgh, 2007
322007
Handoff processes, information quality and patient safety: A trans‐disciplinary literature review
JL Gogan, RJ Baxter, SR Boss, AM Chircu
Business Process Management Journal, 2013
252013
The dark side of online knowledge sharing (retracted)
AL Smith, RJ Baxter, SR Boss, JE Hunton
Journal of Information Systems 26 (2), 71-91, 2012
212012
Medication errors, handoff processes and information quality: A community hospital case study
AM Chircu, JL Gogan, SR Boss, R Baxter
Business Process Management Journal, 2013
202013
Scared Straight: An Empirical Comparison of Two Major Theoretical Models Explaining User Backups
S Boss, D Galletta
Proceedings of the International Research Symposium on Accounting …, 2008
72008
Control, Risk and Information Security Precautions
SR Boss
72005
The White-Collar Hacking Contest: A Novel Approach to Teach Forensic Investigations in a Digital World
M Schermann, SR Boss
22014
Handoffs and medication errors: A community hospital case study
AM Chircu, JL Gogan, RJ Baxter, SR Boss
2011 44th Hawaii International Conference on System Sciences, 1-10, 2011
22011
Familiarity breeds content: How fear of cybercrime influences individual precaution-taking behavior
SR Boss, LJ Kirsch, I Angermeier, RW Boss
IFIP TC8 International Workshop on IS Security Research, Capetown, South …, 2009
22009
The Formation and Evolution of Faultlines in Large-Scale, Multi-Party Information Systems Development.
S Slaughter, EI Diamant, MH Haney, L Ma, LJ Kirsch, SR Boss
ICIS, 70, 2007
22007
IntelliClean: A Teaching Case Designed to Integrate Data Cleaning and Spreadsheet Skills into the Audit Curriculum
K Hunter, CT Alberti, SR Boss, JC Thibodeau
Journal of Emerging Technologies in Accounting Teaching Notes 17 (2), 1-7, 2020
12020
Asymmetry in identification of multiplicity errors
CL Dunn, G Gerard, S Grabski, S Boss
12014
When shall I tell? Relational promotion and timing of information technology diffusion
D Gibbons, B Butler, S Boss
DIGIT 2004 Proceedings, 7, 2004
12004
Developing institutional skills for addressing big data: Experiences in implementation of AACSB Standard 5
S Sarkar, J Gray, SR Boss, E Daly
Journal of Accounting Education 54, 100708, 2021
2021
The system can't perform the operation now. Try again later.
Articles 1–20