| Analysis of end user security behaviors JM Stanton, KR Stam, P Mastrangelo, J Jolton Computers & security 24 (2), 124-133, 2005 | 1125 | 2005 |
| Information technology, privacy, and power within organizations: A view from boundary theory and social exchange perspectives JM Stanton, KR Stam Surveillance & Society 1 (2), 152-190, 2003 | 190 | 2003 |
| The occupational culture of IS/IT personnel within organizations IR Guzman, KR Stam, JM Stanton ACM SIGMIS Database: the DATABASE for Advances in Information Systems 39 (1 …, 2008 | 152 | 2008 |
| The visible employee: using workplace monitoring and surveillance to protect information assets--without compromising employee privacy or trust JM Stanton, KR Stam Information Today, Inc., 2006 | 112 | 2006 |
| Behavioral information security: Two end user survey studies of motivation and security practices J Stanton, P Mastrangelo, K Stam, J Jolton | 107 | 2004 |
| Events, emotions, and technology: examining acceptance of workplace technology changes KR Stam, JM Stanton Information Technology & People 23 (1), 23-53, 2010 | 104 | 2010 |
| Examining the linkage between organizational commitment and information security JM Stanton, KR Stam, I Guzman, C Caledra SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems …, 2003 | 101 | 2003 |
| Contexts and patterns of men's commercial sexual partnerships in northeastern Thailand: implications for AIDS prevention E Maticka-Tyndale, D Elkins, M Haswell-Elkins, D Rujkarakorn, ... Social science & medicine 44 (2), 199-213, 1997 | 91 | 1997 |
| A qualitative study of the occupational subculture of information systems employees in organizations IR Guzman, JM Stanton, KR Stam, V Vijayasri, I Yamodo, N Zakaria, ... Proceedings of the 2004 SIGMIS conference on Computer personnel research …, 2004 | 61 | 2004 |
| Online advocacy: Analysis of human rights NGO websites LN Kingston, KR Stam Journal of Human Rights Practice 5 (1), 75-95, 2013 | 53 | 2013 |
| Employee resistance to digital information and information technology change in a social service agency: A membership category approach KR Stam, JM Stanton, IR Guzman | 41 | 2004 |
| Creating digital narratives: The structure and design of stories told across multiple media P Stackelberg | 39 | 2011 |
| Behavioral information security: An overview, results, and research agenda JM Stanton, KR Stam, PM Mastrangelo, JA Jolton Human-Computer Interaction and Management Information Systems: Foundations …, 2015 | 31 | 2015 |
| Recovering from statelessness: Resettled Bhutanese-Nepali and Karen refugees reflect on the lack of legal nationality LN Kingston, KR Stam Journal of Human Rights 16 (4), 389-406, 2017 | 25 | 2017 |
| Struggling to start over: Human rights challenges for Somali Bantu refugees in the United States R Coughlan, K Stam, LN Kingston The International Journal of Human Rights 20 (1), 123-137, 2016 | 21 | 2016 |
| Behavioral information security: Defining the criterion space J Stanton, C Caldera, A Isaac, K Stam, S Marcinkowski OSF, 2021 | 18 | 2021 |
| Relaying the message of safer sex: Condom races for community-based skills training DB Elkins, LR Dole, E Maticka-Tyndale, KR Stam Health Education Research 13 (3), 357-370, 1998 | 15 | 1998 |
| Exploring security and privacy issues in hospital information system: An information boundary theory perspective N Zakaria, J Stanton, K Stam AMIA Annual Symposium Proceedings 2003, 1059, 2003 | 14 | 2003 |
| Where Dreams and Dragons Meet. An Ethnographic Analysis of two Examples of Massive Multiplayer Online Role-Playing Games (MMORPGs). K Stam, M Scialdone Online–Heidelberg Journal of Religions on the Internet: Vol. 03.1 Being …, 2008 | 9 | 2008 |
| Bhutanese or Nepali? The Politics of Ethnonym Ambiguity A Nelson, K Stam South Asia: Journal of South Asian Studies 44 (4), 772-789, 2021 | 8 | 2021 |