Joseph S. Valacich
Affiliations: | Washington State University, Pullman, WA, United States |
Area:
Management Business Administration, Industrial Psychology, Computer ScienceGoogle:
"Joseph Valacich"Children
Sign in to add traineeSaonee Sarker | grad student | 2002 | WSU |
Anna V. Sidorova | grad student | 2002 | WSU |
Jay J. Jung | grad student | 2003 | WSU |
Clayton A. Looney | grad student | 2003 | WSU |
Heidi L. Connole | grad student | 2005 | WSU |
Darren B. Nicholson | grad student | 2005 | WSU |
Dhanila V. Parboteeah | grad student | 2005 | WSU |
Christoph Schneider | grad student | 2007 | WSU |
Adam D. Benson | grad student | 2008 | WSU |
Damon E. Campbell | grad student | 2008 | WSU |
Sutirtha Chatterjee | grad student | 2008 | WSU |
Christopher L. Scott | grad student | 2008 | WSU |
Anna L. McNab | grad student | 2009 | WSU |
Ryan T. Wright | grad student | 2005-2009 | UVA |
Stoney L. Brooks | grad student | 2013 | WSU |
BETA: Related publications
See more...
Publications
You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect. |
Pickard MD, Schuetzler R, Valacich JS, et al. (2020) Innovative Accounting Interviewing: A Comparison of Real and Virtual Accounting Interviewers The Accounting Review. 0-0 |
Benjamin VA, Valacich JS, Chen H. (2019) DICE-E: A framework for conducting Darknet identification, collection, evaluation with ethics Management Information Systems Quarterly. 43: 1-22 |
Jenkins JL, Proudfoot JG, Valacich JS, et al. (2019) Sleight of Hand: Identifying Concealed Information by Monitoring Mouse-Cursor Movements Journal of the Association For Information Systems. 20: 1-32 |
Valacich JS, Wang X, Jessup LM. (2018) Did I Buy the Wrong Gadget?: How the Evaluability of Technology Features Influences Technology Feature Preferences and Subsequent Product Choice Management Information Systems Quarterly. 42: 633-644 |
Hibbeln MT, Jenkins JL, Schneider C, et al. (2017) How Is Your User Feeling? Inferring Emotion Through Human-Computer Interaction Devices Management Information Systems Quarterly. 41: 1-21 |
Giboney JS, Proudfoot JG, Goel S, et al. (2016) The Security Expertise Assessment Measure (SEAM): Developing a scale for hacker expertise Computers and Security. 60: 37-51 |
Chatterjee S, Sarker S, Valacich JS. (2015) The behavioral roots of information systems security: Exploring key factors related to unethical IT use Journal of Management Information Systems. 31: 49-87 |
Wang X, Schneider C, Valacich JS. (2015) Enhancing creativity in group collaboration: How performance targets and feedback shape perceptions and idea generation performance Computers in Human Behavior. 42: 187-195 |
Wilson DW, Schuetzler RM, Dorn B, et al. (2015) When disclosure is involuntary: Empowering users with control to reduce concerns 2015 International Conference On Information Systems: Exploring the Information Frontier, Icis 2015 |
Ko YJ, Chang Y, Rhee YC, et al. (2014) Value-based stakeholder loyalty toward sport technology A case of the electronic body protector and scoring system in Taekwondo events Ricyde: Revista Internacional De Ciencias Del Deporte. 10: 46-62 |