Follow
David Wilson
Title
Cited by
Cited by
Year
A picture is worth a thousand words: Source credibility theory applied to logo and website design for heightened credibility and consumer trust
PB Lowry, DW Wilson, WL Haig
International Journal of Human-Computer Interaction 30 (1), 63-93, 2014
2932014
Overview and guidance on agile development in large organizations
JB Barlow, J Giboney, MJ Keith, D Wilson, RM Schuetzler, PB Lowry, ...
Communications of the Association for Information Systems 29 (2), 25-44, 2011
2602011
Evaluating journal quality and the association for information systems senior scholars' journal basket via bibliometric measures: Do expert journal assessments add value?
PB Lowry, J Gaskin, SL Humpherys, GD Moody, DF Galletta, JB Barlow, ...
MIS quarterly, 993-1012, 2013
2282013
Unpacking the privacy paradox: Irrational decision-making within the privacy calculus
D Wilson, JS Valacich
1362012
Web 2.0: A definition, literature review, and directions for future research
DW Wilson, X Lin, P Longstreet, S Sarker
972011
Mitigating biodiversity impacts associated with solar and wind energy development. Synthesis and key messages
L Bennun, J Van Bochove, C Ng, C Fletcher, D Wilson, N Phair, ...
by: IUCN, Gland, Switzerland and The Biodiversity Consultancy, Cambridge, UK, 2021
602021
Patterns of Nonverbal Behavior Associated with Truth and Deception
JK Burgoon, J Proudfoot, DW Wilson, RS Schuetzler
Journal of Nonverbal Behavior, 2014
562014
Kinesic patterning in deceptive and truthful interactions
JK Burgoon, R Schuetzler, D W Wilson
Journal of Nonverbal Behavior 39, 1-24, 2015
402015
Saving face on Facebook: privacy concerns, social benefits, and impression management
D Wilson, J Proudfoot, J Valacich
362014
Serious games: An evaluation framework and case study
DW Wilson, J Jenkins, N Twyman, M Jensen, JS Valacich, N Dunbar, ...
Hawaii International Conference on System Sciences, 2016
242016
Using trust and anonymity to expand the use of anonymizing systems that improve security across organizations
A Vance, P Benjamin Lowry, DW Wilson
Security Journal 30, 979-999, 2017
182017
Using trust and anonymity to expand the use of anonymizing systems that improve security across organizations
A Vance, P Benjamin Lowry, DW Wilson
Security Journal 30, 979-999, 2017
182017
Mitigating cognitive bias through the use of serious games: Effects of feedback
NE Dunbar, ML Jensen, CH Miller, E Bessarabova, SK Straub, SN Wilson, ...
Persuasive Technology: 9th International Conference, PERSUASIVE 2014, Padua …, 2014
162014
Interactive deception in group decision-making: new insights from communication pattern analysis
JK Burgoon, D Wilson, M Hass, R Schuetzler
Discovering Hidden Temporal Patterns in Behavior and Interaction: T-Pattern …, 2016
132016
Measurement and outcomes of identity communication in virtual teams
SA Brown, SB Thatcher, DW Wilson
Hawaii International Conference on System Sciences, 2016
102016
When disclosure is involuntary: Empowering users with control to reduce concerns
DW Wilson, RM Schuetzler, B Dorn, JG Proudfoot
102015
Development and application of a self-report measure for assessing sensitive information disclosures across multiple modes
MD Pickard, D Wilson, CA Roster
Behavior Research Methods 50, 1734-1748, 2018
82018
Examining Predictors and Outcomes of Identity Communication in Virtual Teams.
DW Wilson, SA Brown, SMB Thatcher
ECIS, 2015
52015
Media capabilities that support identity communication in virtual teams
DW Wilson, SMB Thatcher, SA Brown
2015 48th Hawaii International Conference on System Sciences, 702-711, 2015
32015
Identity communication in virtual teams: Insights from interviews with working professionals
D Wilson, S Brown, S Thatcher, S Harris
'^'eds.'): Book Identity Communication in Virtual Teams: Insights from …, 2015
32015
The system can't perform the operation now. Try again later.
Articles 1–20