Ernst Bekkering
Ernst Bekkering
Associate Professor of Computer Science, Northeastern State University
Verified email at
Cited by
Cited by
Trust in videoconferencing
E Bekkering, JP Shim
Communications of the ACM 49 (7), 103-107, 2006
Introducing the check-off password system (COPS): an advancement in user authentication methods and information security
M Warkentin, K Davis, E Bekkering
Journal of Organizational and End User Computing (JOEUC) 16 (3), 41-58, 2004
Analysis of systems development project risks: An integrative framework
M Warkentin, RS Moore, E Bekkering, AC Johnston
ACM SIGMIS Database: the DATABASE for Advances in Information Systems 40 (2 …, 2009
Steganography: Forensic, security, and legal issues
M Warkentin, E Bekkering, MB Schmidt
Journal of Digital Forensics, Security and Law 3 (2), 2, 2008
Steganography and steganalysis
M Warkentin, MB Schmidt, E Bekkering
Enterprise Information Systems Assurance and System Security: Managerial and …, 2006
Empirical findings on perceived value of mobile commerce as a distribution channel
JP Shim, E Bekkering, L Hall
AMCIS 2002 Proceedings, 252, 2002
An empirical assessment of technology adoption as a choice between alternatives
E Bekkering, AC Johnston, M Warkentin, MB Schmidt
Information Resources Management Journal (IRMJ) 22 (4), 23-44, 2009
Using remote desktop applications in education
D Hutchison, E Bekkering
Hutchison and Bekkering, Proc ISECON 24, 2007
A follow-up study of detecting phishing emails
E Bekkering, D Hutchison, L Werner
Proceedings of the Conference on Information Systems Applied Research …, 2009
A follow-up study of using remote desktop applications in education
E Bekkering, D Hutchison
Information Systems Education Journal 7 (55), 1-13, 2009
A proposed study and analysis of user perceptions of biometric acceptance
MB Schmidt, D Das, V Kumar, E Bekkering
Proceedings of the 39th Annual Meeting of the Decision Sciences Institute …, 2008
Design and analysis of a data fusion scheme in mobile wireless sensor networks based on multi-protocol mobile agents
C Wu, W Wu, C Wan, E Bekkering, N Xiong
Sensors 17 (11), 2523, 2017
MDFC–ResNet: An Agricultural IoT System to Accurately Recognize Crop Diseases
WJ Hu, J Fan, YX Du, BS Li, N Xiong, E Bekkering
IEEE Access 8, 115287-115298, 2020
Proposed study of end-user perceptions regarding Tablet PCs
M Warkentin, E Bekkering, M Schmidt, A Johnston
Proceedings of the Information Resources Management Conference, Idea Group …, 2004
On the illicit use of steganography and its detection
MB Schmidt, E Bekkering, M Warkentin
Proceedings of the 2004 ISOneWorld International Conference, 1-10, 2004
Digital Steganography—An Introduction to Techniques and Tools
MB Pope, M Warkentin, E Bekkering, MB Schmidt
Communications of the Association for Information Systems 30 (1), 22, 2012
M Warkentin, MB Schmidt, E Bekkering
Cyber warfare and cyber terrorism, 50-56, 2007
A longitudinal comparison of four password procedures
E Bekkering, M Warkentin, K Davis
Proceedings of the 2003 Hawaii International Conference on Business …, 2003
IT security management practices: Successes and failures in coping with Blaster and Sobig. F
AC Johnston, MB Schmidt, E Bekkering
Proceedings of the 2004 ISOneWorld International Conference, 1-12, 2004
Class Participation and Student Performance: A Tale of Two Courses.
E Bekkering, T Ward
Information Systems Education Journal 18 (6), 86-98, 2020
The system can't perform the operation now. Try again later.
Articles 1–20