Jordan Shropshire
Jordan Shropshire
Professor of CIS, University of South Alabama
Verified email at
Cited by
Cited by
Personality, attitudes, and intentions: Predicting initial adoption of information security behavior
J Shropshire, M Warkentin, S Sharma
Computers & Security 49, 177-191, 2015
The influence of the informal social learning environment on information privacy policy compliance efficacy and intention
M Warkentin, AC Johnston, J Shropshire
European Journal of Information Systems 20 (3), 267-284, 2011
Knowledge and skill requirements for entry-level IT workers: A longitudinal study
C Aasheim, J Shropshire, L Li, C Kadlec
Journal of Information Systems Education 23 (2), 193-204, 2012
Continuance of protective security behavior: A longitudinal study
M Warkentin, AC Johnston, J Shropshire, WD Barnett
Decision Support Systems 92, 25-35, 2016
Podcasting for e‐learning, communication, and delivery
JP Shim, J Shropshire, S Park, H Harris, N Campbell
Industrial Management & Data Systems, 2007
I’m leaving the IT field: The impact of stress, job insecurity, and burnout on IT professionals
J Shropshire, C Kadlec
International Journal of Information and Communication Technology Research 2 (1), 2012
Personality and IT security: An application of the five-factor model
J Shropshire, M Warkentin, A Johnston, M Schmidt
AMCIS 2006 Proceedings, 415, 2006
Where are you going? A comparative analysis of job and career change intentions among USA it workers
J Shropshire, C Kadlec
Journal of Internet Banking and Commerce 17 (2), 1, 2012
A canonical analysis of intentional information security breaches by insiders
J Shropshire
Information Management & Computer Security, 2009
Impact of negative message framing on security adoption
JD Shropshire, M Warkentin, AC Johnston
Journal of Computer Information Systems 51 (1), 41-51, 2010
Extending the cloud with fog: Security challenges & opportunities
J Shropshire
Best practices in IT disaster recovery planning among US banks
C Kadlec, J Shropshire
The Journal of Internet Banking and Commerce 15 (1), 1-11, 1970
The IT security adoption conundrum: An initial step toward validation of applicable measures
M Warkentin, J Shropshire, A Johnston
AMCIS 2007 Proceedings, 276, 2007
Perceived value of podcasting: Student communication-medium preferences
JP Shim, J Shropshire, S Park, H Harris, N Campbell
AMCIS 2006 Proceedings, 271, 2006
Analysis of monolithic and microkernel architectures: Towards secure hypervisor design
J Shropshire
2014 47th Hawaii International Conference on System Sciences, 5008-5017, 2014
Developing the IT disaster recovery planning construct
J Shropshire, C Kadlec
Journal of Information Technology Management 20 (4), 37, 2009
Breakpoints: An analysis of potential hypervisor attack vectors
L Turnbull, J Shropshire
2013 Proceedings of IEEE Southeastcon, 1-6, 2013
Insight from a docker container introspection
T Watts, R Benton, W Glisson, J Shropshire
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019
Rootkit detection through phase-space analysis of power voltage measurements
JA Dawson, JT McDonald, J Shropshire, TR Andel, P Luckett, L Hively
2017 12th International Conference on Malicious and Unwanted Software …, 2017
Securing cloud infrastructure: unobtrusive techniques for detecting hypervisor compromise
J Shropshire
ICCSM2015-3rd International Conference on Cloud Security and Management …, 2015
The system can't perform the operation now. Try again later.
Articles 1–20