Follow
Joseph H. Schuessler, Ph.D.
Joseph H. Schuessler, Ph.D.
Marketing and Computer Information Systems, Tarleton State University
Verified email at tarleton.edu - Homepage
Title
Cited by
Cited by
Year
Defining and identifying disruptive innovations
D Nagy, J Schuessler, A Dubinsky
Industrial marketing management 57, 119-126, 2016
4132016
General Deterrence Theory: Assessing Information Systems Security Effectiveness in Large versus Small Businesses
JH Schuessler
ProQuest, 183, 2009
362009
Contemporary Threats and Countermeasures: A Security Evaluation
JH Schuessler
Journal of Information Privacy & Security 9 (2), 18, 2013
12*2013
“Chunking” Semester Projects: Does it Enhance Student Learning?
JH Schuessler
Journal of Higher Education Theory and Practice 17 (7), 2017
82017
Pre-Employment Screening for Security Risk: An Exploratory Study
JH Schuessler, DM Hite
Journal of Applied Business and Economics 16 (1), 2014
82014
Work ethic and information security behavior
T Ramakrishnan, DM Hite, JH Schuessler, V Prybutok
Information & Computer Security 30 (3), 364-381, 2022
62022
Data breach Laws: do they work?
JH Schuessler, D Nagy, HK Fulk, A Dearing
Journal of Applied Security Research 12 (4), 512-524, 2017
52017
Web Scraping to Inform Curriculum Decisions
JS Norcross, JH Schuessler, DG Jones
Journal of Higher Education Theory and Practice 20 (10), 2020
32020
Systems Security Effectiveness in Large versus Small Businesses
JH Schuessler, J Windsor, A Wu
Journal of Information System Security 10 (1), 2015
3*2015
Web scraping to inform curriculum decisions: An exploratory study
J Schuessler, D Jones
22018
Threats and Countermeasures of the Realm in 2011
JH Schuessler
Southwest Decision Sciences Forty-Third Annual Meeting, 9, 2012
22012
An information systems security framework
J Schuessler
AMCIS 2007 Proceedings, 304, 2007
22007
Portable Privacy: Mobile Device Adoption
JH Schuessler, B Ibragimova
Annual Security Conference. Retrieved from www. securityconference. org …, 2009
12009
Hacking Framework Extended: The Role of Vulnerabilities
JH Schuessler, B Ibragimova
Retrieved 10/18/2012 from http://joseph. schuesslersounds. com/Research …, 2009
12009
Understanding Enterprise System Innovation: A Belief, Action, Outcome Proposal
D Nagy, J Schuessler, HK Fulk, C Holton
Southwest Decision Sciences Institute, 2015, 2015
2015
Data Breach Laws: Do They Work? An Exploratory Study
J Schuessler, D Nagy, A Dearing, HK Fulk
Southwest Decision Sciences Institutes, 2015, 2015
2015
Defining and Predicting Disruptive Innovations
D Nagy, J Schuessler
2014 Annual Meeting of the Decision Sciences Institute, 2014
2014
Cognitive Ability, Personal Computer Security Posture, and Employability: An Exploratory Study
J Schuessler, T Ramakrishnan
Decision Sciences Institute's Annual Conference, 2014
2014
Information Systems Security: Developing a Stage Theory
JH Schuessler
Southwest Decision Sciences Forty-Second Annual Meeting, 9, 2011
2011
Joseph H. Schuessler Ph. D.
JH Schuessler
The system can't perform the operation now. Try again later.
Articles 1–20