kathryn stam
kathryn stam
SUNY Polytechnic Institute
Verified email at - Homepage
Cited by
Cited by
Analysis of end user security behaviors
JM Stanton, KR Stam, P Mastrangelo, J Jolton
Computers & security 24 (2), 124-133, 2005
Information technology, privacy, and power within organizations: A view from boundary theory and social exchange perspectives
JM Stanton, KR Stam
Surveillance & Society 1 (2), 152-190, 2003
The occupational culture of IS/IT personnel within organizations
IR Guzman, KR Stam, JM Stanton
ACM SIGMIS Database: the DATABASE for Advances in Information Systems 39 (1 …, 2008
The visible employee: using workplace monitoring and surveillance to protect information assets--without compromising employee privacy or trust
JM Stanton, KR Stam
Information Today, Inc., 2006
Examining the linkage between organizational commitment and information security
JM Stanton, KR Stam, I Guzman, C Caledra
SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems …, 2003
Behavioral information security: Two end user survey studies of motivation and security practices
J Stanton, P Mastrangelo, K Stam, J Jolton
Events, emotions, and technology: examining acceptance of workplace technology changes
KR Stam, JM Stanton
Information Technology & People 23 (1), 23-53, 2010
Contexts and patterns of men's commercial sexual partnerships in northeastern Thailand: implications for AIDS prevention
E Maticka-Tyndale, D Elkins, M Haswell-Elkins, D Rujkarakorn, ...
Social science & medicine 44 (2), 199-213, 1997
A qualitative study of the occupational subculture of information systems employees in organizations
IR Guzman, JM Stanton, KR Stam, V Vijayasri, I Yamodo, N Zakaria, ...
Proceedings of the 2004 SIGMIS conference on Computer personnel research …, 2004
Online advocacy: Analysis of human rights NGO websites
LN Kingston, KR Stam
Journal of Human Rights Practice 5 (1), 75-95, 2013
Employee resistance to digital information and information technology change in a social service agency: A membership category approach
KR Stam, JM Stanton, IR Guzman
Creating digital narratives: The structure and design of stories told across multiple media
P Stackelberg
Behavioral information security: An overview, results, and research agenda
JM Stanton, KR Stam, PM Mastrangelo, JA Jolton
Human-Computer Interaction and Management Information Systems: Foundations …, 2015
Recovering from statelessness: Resettled Bhutanese-Nepali and Karen refugees reflect on the lack of legal nationality
LN Kingston, KR Stam
Journal of Human Rights 16 (4), 389-406, 2017
Behavioral information security: Defining the criterion space
J Stanton, C Caldera, A Isaac, K Stam, S Marcinkowski
SocArXiv, 2021
Struggling to start over: Human rights challenges for Somali Bantu refugees in the United States
R Coughlan, K Stam, LN Kingston
The International Journal of Human Rights 20 (1), 123-137, 2016
Exploring security and privacy issues in hospital information system: an Information Boundary Theory perspective.
N Zakaria, JM Stanton, KR Stam
AMIA, 2003
Relaying the message of safer sex: Condom races for community-based skills training
DB Elkins, LR Dole, E Maticka-Tyndale, KR Stam
Health Education Research 13 (3), 357-370, 1998
The Madness of Crowds: Employees Beliefs about Information Security in Relation to Security Outcomes
J Stanton, I Yamodo-Fagnot, K Stam
The Security Conference, 2005
Information security practices in Latin America: the case of Bolivia
IR Guzman, SM Galvez, JM Stanton, KR Stam
The system can't perform the operation now. Try again later.
Articles 1–20