default search action
B. Dawn Medlin
Person information
- affiliation: Appalachian State University, Boone, NC, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j18]Steven Leon, B. Dawn Medlin:
A Conceptual Framework for Collaboration in Business Schools. Int. J. Inf. Syst. Soc. Chang. 11(3): 32-45 (2020)
2010 – 2019
- 2018
- [j17]Hoon Seok Choi, Myung S. Ko, Dawn Medlin, Charlie Chen:
The effect of intrinsic and extrinsic quality cues of digital video games on sales: An empirical investigation. Decis. Support Syst. 106: 86-96 (2018) - [c19]Beverly Medlin, Sandra A. Vannoy, Austin Eggers:
Privacy, Security and Legislative Actions Related to Drone Usage. AMCIS 2018 - [c18]Michael B. Knight, Dragos Vieru, B. Dawn Medlin:
Introduction to the Minitrack on Social-Technical Issues in Organizational Information Technologies. HICSS 2018: 1 - 2017
- [j16]Sandra A. Vannoy, B. Dawn Medlin:
Social Computing: An Examination of Self, Social, and Use Factors. Int. J. Virtual Communities Soc. Netw. 9(4): 31-47 (2017) - [c17]Michael B. Knight, B. Dawn Medlin, Dragos Vieru:
Introduction to Social-Technical Issues in Organizational Information Technologies Minitrack. HICSS 2017: 1 - 2016
- [c16]Michael B. Knight, Dragos Vieru, B. Dawn Medlin:
Introduction to Social-Technical Issues in Organizational Information Technologies Minitrack. HICSS 2016: 5136 - [c15]Krassie Petrova, Adriana Romaniello, B. Dawn Medlin, Sandra A. Vannoy:
QR Codes Advantages and Dangers. ICE-B 2016: 112-115 - [c14]Makoto Nakayama, B. Dawn Medlin, Charlie C. Chen, Sandra A. Vannoy:
Key Factors Increasing the Trust and Intention to Adopt Standard Cloud-based Applications. PACIS 2016: 229 - 2015
- [c13]B. Dawn Medlin, Sandra A. Vannoy, Charlie C. Chen:
Music Piracy Among College Students. AMCIS 2015 - 2014
- [c12]Michael B. Knight, B. Dawn Medlin:
Introduction to Organizational and Social Dynamics in Information Technology Minitrack. HICSS 2014: 4456 - 2013
- [j15]B. Dawn Medlin:
Social Engineering Techniques and Password Security: Two Issues Relevant in the Case of Health Care Workers. Int. J. Cyber Warf. Terror. 3(2): 58-70 (2013) - [j14]Sandra A. Vannoy, Charlie C. Chen, B. Dawn Medlin:
Investigating the impact of differences in kind upon resource consumption in web-based social networks. Soc. Netw. Anal. Min. 3(3): 437-456 (2013) - [c11]Sandra A. Vannoy, B. Dawn Medlin:
Exploring the Factors that Influence Social Computing Intentions. AMCIS 2013 - [c10]Michael B. Knight, B. Dawn Medlin:
Introduction to Organizational and Social Dynamics in Information Technology Minitrack. HICSS 2013: 4512 - 2012
- [j13]Elaine R. Winston, B. Dawn Medlin, Adriana Romaniello:
An e-patient's End-user community (EUCY): The value added of social network applications. Comput. Hum. Behav. 28(3): 951-957 (2012) - [c9]Sandra A. Vannoy, B. Dawn Medlin:
Investigating Social Computing in Competitive Dynamics. HICSS 2012: 5112-5121 - 2011
- [j12]Sandra A. Vannoy, B. Dawn Medlin, Charlie C. Chen:
Enhancing the Trust of Members in Online Social Networks: An Integrative Technical and Marketing Perspective. Int. J. Virtual Communities Soc. Netw. 3(4): 15-31 (2011) - 2010
- [c8]Tibebe Tesema, Dawn Medlin, Ajith Abraham:
Patient's perception of health information security: The case of selected public and private hospitals in Addis Ababa. IAS 2010: 179-184 - [c7]Alanah Mitchell, Charlie C. Chen, B. Dawn Medlin:
E-Learning to Improve Intercultural Communication. AMCIS 2010: 10
2000 – 2009
- 2009
- [j11]Joseph A. Cazier, B. Dawn Medlin, Antonina Durfee:
Investigating Task Completion for a Complicated Online Travel Search. J. Inf. Technol. Tour. 11(1): 43-50 (2009) - 2008
- [j10]John A. Cassini, B. Dawn Medlin, Adriana Romaniello:
Laws and Regulations Dealing with Information Security and Privacy: An Investigative Study. Int. J. Inf. Secur. Priv. 2(2): 70-82 (2008) - [j9]B. Dawn Medlin, Joseph A. Cazier, Daniel P. Foulk:
Analyzing the Vulnerability of U.S. Hospitals to Social Engineering Attacks: How Many of Your Employees Would Share Their Password? Int. J. Inf. Secur. Priv. 2(3): 71-83 (2008) - [j8]Charlie C. Chen, B. Dawn Medlin, R. S. Shaw:
A cross-cultural investigation of situational information security awareness programs. Inf. Manag. Comput. Secur. 16(4): 360-376 (2008) - [j7]Adriana Romaniello, B. Dawn Medlin:
Outsourcing Non-Core Business Processes: An Exploratory Study. J. Inf. Technol. Res. 1(2): 21-37 (2008) - [c6]Hennie A. Kruger, Tjaart Steyn, Lynette Drevin, Dawn Medlin:
Password Management: Empirical Results from a RSA and USA Study. ISSA 2008: 1-11 - 2007
- [j6]B. Dawn Medlin, Joseph A. Cazier:
An Empirical Investigation: Health Care Employee Passwords and Their Crack Times in Relationship to HIPAA Security Standards. Int. J. Heal. Inf. Syst. Informatics 2(3): 39-48 (2007) - [j5]Joseph A. Cazier, E. Vance Wilson, B. Dawn Medlin:
The Role of Privacy Risk in IT Acceptance: An Empirical Study. Int. J. Inf. Secur. Priv. 1(2): 61-73 (2007) - [j4]Antonina Durfee, B. Dawn Medlin, Joseph A. Cazier:
User characteristics for overcoming bias and intrigue in travel searches. Int. J. Netw. Virtual Organisations 4(1): 76-91 (2007) - [c5]Joseph A. Cazier, Antonina Durfee, B. Dawn Medlin:
An Exploration of Antecedent Characteristics for Predicting User Perseverance in Online Travel Shopping. AMCIS 2007: 167 - 2006
- [j3]Joseph A. Cazier, B. Dawn Medlin:
Password Security: An Empirical Investigation into E-Commerce Passwords and Their Crack Times. Inf. Secur. J. A Glob. Perspect. 15(6): 45-55 (2006) - [c4]Joseph A. Cazier, E. Vance Wilson, B. Dawn Medlin:
The Role of Privacy Risk in IT Acceptance: An Empirical Study. AMCIS 2006: 119 - [c3]Antonina Durfee, B. Dawn Medlin, Joseph A. Cazier:
Bias and Intrigue in Internet Searches: Do You Have the Patience and Skill to Find What You Need? AMCIS 2006: 343 - 2005
- [j2]Christopher Conca, B. Dawn Medlin, Dinesh S. Dave:
Technology-based security threats: taxonomy of sources, targets and a process model of alleviation. Int. J. Inf. Technol. Manag. 4(2): 166-177 (2005) - [c2]B. Dawn Medlin:
IT Enabled Business Process Onshore Outsourcing: An Empirical Analysis. AMCIS 2005: 414 - [c1]B. Dawn Medlin, Joseph A. Cazier, Dinesh S. Dave:
Password Selection by End Users from an eCommerce Site: An Empirical Study. AMCIS 2005: 447 - 2001
- [j1]B. Dawn Medlin, Dinesh S. Dave, Sandra A. Vannoy:
Students' Views of the Importance of Techncal and Non-Technical Skills for Successful it Professionals. J. Comput. Inf. Syst. 42(1): 65-69 (2001)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 23:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint