Andy Luse
Andy Luse
Verified email at okstate.edu
Title
Cited by
Cited by
Year
Selecting a research topic: A framework for doctoral students
A Luse, BE Mennecke, AM Townsend
International Journal of Doctoral Studies 7, 143, 2012
772012
Personality and cognitive style as predictors of preference for working in virtual teams
A Luse, JC McElroy, AM Townsend, S DeMarie
Computers in Human Behavior 29 (4), 1825-1832, 2013
752013
Virtual training: Learning transfer of assembly tasks
P Carlson, A Peters, SB Gilbert, JM Vance, A Luse
IEEE transactions on visualization and computer graphics 21 (6), 770-782, 2015
702015
IT-adventures: A program to spark IT interest in high school students using inquiry-based learning with cyber defense, game design, and robotics
JA Rursch, A Luse, D Jacobson
IEEE Transactions on Education 53 (1), 71-79, 2009
522009
Collaboration, connectedness, and community: An examination of the factors influencing student persistence in virtual communities
D Laux, A Luse, BE Mennecke
Computers in Human Behavior 57, 452-464, 2016
512016
Institutional boundaries and trust of virtual teams in collaborative design: An experimental study in a virtual world environment
SZ Schiller, BE Mennecke, FFH Nah, A Luse
Computers in Human Behavior 35, 565-577, 2014
502014
An empirical validation of malicious insider characteristics
N Liang, DP Biros, A Luse
Journal of Management Information Systems 33 (2), 361-392, 2016
402016
The changing nature of user attitudes toward virtual world technology: A longitudinal study
A Luse, B Mennecke, J Triplett
Computers in Human Behavior 29 (3), 1122-1132, 2013
332013
Understanding the moderating roles of types of recommender systems and products on customer behavioral intention to use recommender systems
YY Wang, A Luse, AM Townsend, BE Mennecke
Information Systems and e-Business Management 13 (4), 769-799, 2015
262015
Utilizing structural equation modeling and social cognitive career theory to identify factors in choice of IT as a major
A Luse, JA Rursch, D Jacobson
ACM Transactions on Computing Education (TOCE) 14 (3), 1-19, 2014
242014
IT can matter: co-evolution fostering IT competitive advantage
A Luse, B Mennecke
Management Research Review, 2014
212014
A component-based framework for visualization of intrusion detection events
A Luse, KP Scheibe, AM Townsend
Information Security Journal: A Global Perspective 17 (2), 95-107, 2008
202008
The Role of Effective Modeling in the Development of Self‐Efficacy: The Case of the Transparent Engine
KP Scheibe, BE Mennecke, A Luse
Decision Sciences Journal of Innovative Education 5 (1), 21-42, 2007
142007
Adoption of biometric authentication systems: implications for research and practice in the deployment of end-user security systems
D Laux, A Luse, B Mennecke, AM Townsend
Journal of Organizational Computing and Electronic Commerce 21 (3), 221-245, 2011
122011
GuardDV: a proximity detection device for homeless survivors of domestic violence
Z Jordán Conde, WE Marsh, AW Luse, LSE Tao
CHI'08 Extended Abstracts on Human Factors in Computing Systems, 3855-3860, 2008
92008
The determinants of acceptance of recommender systems: Applying the UTAUT model
YY Wang, A Townsend, A Luse, B Mennecke
82012
Exploring utilization of visualization for computer and network security
A Luse
Digital Repository@ Iowa State University, 2009
82009
Experience richness: Effects of training method on individual technology acceptance
A Luse, BE Mennecke, A Townsend
2013 46th Hawaii International Conference on System Sciences, 853-862, 2013
72013
Training, Self-Efficacy, and Performance; a Replication Study
B Davazdahemami, A Luse, KP Scheibe, AM Townsend
AIS Transactions on Replication Research 4 (1), 3, 2018
52018
A design methodology and implementation for corporate network security visualization: A modular-based approach
A Luse, BE Mennecke, JL Triplett, N Karstens, D Jacobson
AIS Transactions on Human-Computer Interaction 3 (2), 104, 2011
52011
The system can't perform the operation now. Try again later.
Articles 1–20