E-business differentiation through value-based trust JA Cazier, BBM Shao, RDS Louis Information & management 43 (6), 718-727, 2006 | 131 | 2006 |
Sharing information and building trust through value congruence JA Cazier, BBM Shao, RDS Louis Information Systems Frontiers 9, 515-529, 2007 | 124 | 2007 |
A method for mining combined data from in-hive sensors, weather and apiary inspections to forecast the health status of honey bee colonies AR Braga, DG Gomes, R Rogers, EE Hassler, BM Freitas, JA Cazier Computers and Electronics in Agriculture 169, 105161, 2020 | 104 | 2020 |
Password security: An empirical investigation into e-commerce passwords and their crack times JA Cazier, BD Medlin Information Systems Security 15 (6), 45-55, 2006 | 104 | 2006 |
An empirical analysis of nurse retention: what keeps RNs in nursing? MJ Dotson, DS Dave, JA Cazier, TJ Spaulding JONA: The Journal of Nursing Administration 44 (2), 111-116, 2014 | 88 | 2014 |
The impact of consumer perceptions of information privacy and security risks on the adoption of residual RFID technologies JA Cazier, AS Jensen, DS Dave Communications of the Association for Information Systems 23 (1), 14, 2008 | 82 | 2008 |
The impact of intrinsic motivation on satisfaction with extrinsic rewards in a nursing environment DS Dave, MJ Dotson, JA Cazier, SK Chawla, TF Badgett Journal of Management & Marketing in Healthcare 4 (2), 101-107, 2011 | 60 | 2011 |
Data competence maturity: Developing data-driven decision making TG Cech, TJ Spaulding, JA Cazier Journal of Research in Innovative Teaching & Learning 11 (2), 139-158, 2018 | 50 | 2018 |
Big data analytics sentiment: US-China reaction to data collection by business and government RC LaBrie, GH Steinke, X Li, JA Cazier Technological Forecasting and Social Change 130, 45-55, 2018 | 47 | 2018 |
A practical validation study of a commercial accelerometer using good and poor sleepers DL Dickinson, J Cazier, T Cech Health psychology open 3 (2), 2055102916679012, 2016 | 47 | 2016 |
Analyzing the vulnerability of US hospitals to social engineering attacks: how many of your employees would share their password? BD Medlin, JA Cazier, DP Foulk International Journal of Information Security and Privacy (IJISP) 2 (3), 71-83, 2008 | 45 | 2008 |
Value congruence, trust, and their effects on purchase intention and reservation price J Cazier, B Shao, RS Louis ACM Transactions on Management Information Systems (TMIS) 8 (4), 1-28, 2017 | 42 | 2017 |
Designing a smart honey supply chain for sustainable development MAS Rünzel, EE Hassler, REL Rogers, G Formato, JA Cazier IEEE Consumer Electronics Magazine 10 (4), 69-78, 2021 | 41 | 2021 |
The role of privacy risk in IT acceptance: An empirical study JA Cazier, EV Wilson, BD Medlin International Journal of Information Security and Privacy (IJISP) 1 (2), 61-73, 2007 | 38 | 2007 |
Good farming practices in apiculture J Rivera-Gomis, J Bubnic, A Ribarits, R Moosbeckhofer, O Alber, ... Revue Scientifique Et Technique-Office International Des Epizooties 38 (3), 1-27, 2019 | 36 | 2019 |
Addressing the nursing shortage: A critical health care issue MJ Dotson, DS Dave, JA Cazier Health Marketing Quarterly 29 (4), 311-328, 2012 | 35 | 2012 |
Nurse retention in rural United States: A cluster analytic approach MJ Dotson, DS Dave, JA Cazier, MD McLeod International Journal of Healthcare Management 6 (3), 184-191, 2013 | 33 | 2013 |
An empirical investigation: Health care employee passwords and their crack times in relationship to hipaa security standards BD Medlin, JA Cazier International Journal of Healthcare Information Systems and Informatics …, 2007 | 33 | 2007 |
Systems and methods for air filtration monitoring J Cazier, SM Bergman, CE Hunter, I Lynch, JS Clements, BG Johnson US Patent App. 15/510,534, 2017 | 28 | 2017 |
A framework and guide for understanding the creation of consumer trust JA Cazier Journal of International Technology and Information Management 16 (2), 4, 2007 | 23 | 2007 |