Mark Alan Harris

Director of Graduate Studies in Information Security Management, Associate Professor

  • 229 Citations
  • 9 h-Index
20092018

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Output

  • 229 Citations
  • 9 h-Index
  • 8 Article
  • 4 Conference contribution
  • 1 Review article
2018

A bidirectional perspective of trust and risk in determining factors that influence mobile app installation

Chin, A. G., Harris, M. A. & Brookshire, R., Apr 2018, In : International Journal of Information Management. 39, p. 49-59 11 p.

Research output: Contribution to journalArticle

15 Scopus citations
2016

Consumer trust in Google's top developers' apps: An exploratory study

Harris, M. A. & Chin, A. G., Jan 1 2016, In : Information and Computer Security. 24, 5, p. 474-495 22 p.

Research output: Contribution to journalArticle

1 Scopus citations

Evaluating student learning in an IT curriculum using Bloom's - Webb's Curriculum Taxonomy

Patten, K. P. & Harris, M. A., Sep 28 2016, SIGITE 2016 - Proceedings of the 17th Annual Conference on Information Technology Education. Association for Computing Machinery, Inc, p. 111-114 4 p. (SIGITE 2016 - Proceedings of the 17th Annual Conference on Information Technology Education).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Identifying factors influencing consumers' intent to install mobile applications

Harris, M. A., Brookshire, R. & Chin, A. G., Jun 1 2016, In : International Journal of Information Management. 36, 3, p. 441-450 10 p.

Research output: Contribution to journalArticle

48 Scopus citations

On mobile device security practices and training efficacy: An empirical study

Goyal Chin, A., Etudo, U. & Harris, M. A., 2016, In : Informatics in Education. 15, 2, p. 235-252 18 p.

Research output: Contribution to journalArticle

5 Scopus citations
2015

Mobile application installation influences: Have mobile device users become desensitized to excessive permission requests?

Harris, M. A., Brookshire, R., Patten, K. P. & Regan, E. A., Jan 1 2015, 2015 Americas Conference on Information Systems, AMCIS 2015. Americas Conference on Information Systems, (2015 Americas Conference on Information Systems, AMCIS 2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

8 Scopus citations

Using bloom's and Webb's taxonomies to integrate emerging cybersecurity topics into a computing curriculum

Harris, M. A. & Patten, K. P., Jan 1 2015, In : Journal of Information Systems Education. 26, 3, p. 219-234 16 p.

Research output: Contribution to journalArticle

14 Scopus citations
2014

Mobile device security considerations for small- and medium-sized enterprise business mobility

Harris, M. A. & Patten, K. P., Feb 14 2014, In : Information Management and Computer Security. 22, 1, p. 97-114 18 p., 17104144.

Research output: Contribution to journalReview article

35 Scopus citations
2013

The need for BYOD mobile device security awareness and training

Harris, M. A., Patten, K. & Regan, E., Dec 1 2013, 19th Americas Conference on Information Systems, AMCIS 2013 - Hyperconnected World: Anything, Anywhere, Anytime. p. 3441-3451 11 p. (19th Americas Conference on Information Systems, AMCIS 2013 - Hyperconnected World: Anything, Anywhere, Anytime; vol. 5).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

14 Scopus citations

The need to address mobile device security in the higher education IT curriculum

Patten, K. P. & Harris, M. A., Jan 1 2013, In : Journal of Information Systems Education. 24, 1, p. 41-52 12 p.

Research output: Contribution to journalArticle

17 Scopus citations
2012

Mobile and connected device security considerations: A dilemma for small and medium enterprise business mobility?

Harris, M., Patten, K., Regan, E. & Fjermestad, J., Dec 1 2012, 18th Americas Conference on Information Systems 2012, AMCIS 2012. p. 1677-1683 7 p. (18th Americas Conference on Information Systems 2012, AMCIS 2012; vol. 3).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

11 Scopus citations

Routes to security compliance: Be good or be shamed?

Harris, M. & Furnell, S., Dec 1 2012, In : Computer Fraud and Security. 2012, 12, p. 12-20 9 p.

Research output: Contribution to journalArticle

11 Scopus citations
2009
Open Access
50 Scopus citations