Hacking into the minds of hackers R Young, L Zhang, VR Prybutok Information systems management 24 (4), 281-287, 2007 | 125 | 2007 |
ERP usage in practice: an empirical investigation MC Jones, R Young Information Resources Management Journal (IRMJ) 19 (1), 23-42, 2006 | 68 | 2006 |
Multifoci effects of injustice on counterproductive work behaviors and the moderating roles of symbolization and victim sensitivity JJ Lavelle, CM Harris, DE Rupp, DN Herda, RF Young, MB Hargrove, ... Journal of Organizational Behavior 39 (8), 1022-1039, 2018 | 44 | 2018 |
Malaysian internal and external auditor perceptions of the effectiveness of red flags for detecting fraud GD Moyes, R Young, HF Mohamed Din International Journal of Auditing Technology 1 (1), 91-106, 2013 | 44 | 2013 |
Workplace mindfulness and its effect on staff auditors' audit quality-threatening behavior DN Herda, NH Cannon, RF Young Behavioral Research in Accounting 31 (1), 55-64, 2019 | 35 | 2019 |
Blowing the Whistle: Individual Persuasion Under Perceived Threat of Retaliation R Young Behavioral Research in Accounting 29 (2), 97-111, 2017 | 34 | 2017 |
Empirical evaluation of information security planning and integration RF Young, J Windsor Communications of the Association for Information Systems 26 (1), 13, 2010 | 33 | 2010 |
Illegal computer hacking: An assessment of factors that encourage and deter the behavior R Young, L Zhang Journal of Information Privacy and Security 3 (4), 33-52, 2007 | 25 | 2007 |
The role of organizational justice as a predictor of intent to comply with internal disclosure policies R Young Journal of Accounting and Finance 13 (6), 29-44, 2013 | 16 | 2013 |
Evaluating the perceived impact of collaborative exchange and formalization on information security R Young Journal of International Technology and Information Management 19 (3), 2, 2010 | 14 | 2010 |
The effects of supervisor coaching and workplace mindfulness on audit quality-threatening behavior among staff auditors DN Herda, NH Cannon, RF Young Current Issues in Auditing 13 (1), P1-P6, 2019 | 13 | 2019 |
Defining the information security posture: an empirical examination of structure, integration and managerial effectiveness RF Young University of North Texas, 2008 | 12 | 2008 |
Factors affecting illegal hacking behavior R Young, L Zhang | 9 | 2005 |
Inhibitors of two illegal behaviors: Hacking and shoplifting L Zhang, R Young, V Prybutok Journal of Organizational and End User Computing (JOEUC) 19 (3), 24-42, 2007 | 8 | 2007 |
Auditors' Engagement Team Commitment and Its Effect on Team Citizenship Behavior DN Herda, JJ Lavelle, JR Lauck, RF Young, SM Smith, C Li Advances in Accounting Behavioral Research 25, 59-76, 2022 | 4 | 2022 |
A Comparison of the Inhibitors of Hacking vs. Shoplifting L Zhang, R Young, V Prybutok Evolutionary Concepts in End User Productivity and Performance: Applications …, 2009 | 4 | 2009 |
An Empirical Examination of Psychological Climate and Internal Disclosure Policy Compliance RF Young Advances in Accounting Behavioral Research 19, 127-154, 2016 | 3 | 2016 |
Growth perspective of information security R Young Journal of Information Privacy and Security 5 (4), 51-67, 2009 | 3 | 2009 |
An examination of the effectiveness of test-of-controls audit procedures for detecting fraud R Young, GD Moyes International Journal of Auditing Technology 2 (1), 22-36, 2014 | 1 | 2014 |
Martin’s Lounge: From Valuation Engagement to Fraud Examination RF Young, CT Conn, BE Brewster Journal of Forensic Accounting Research Teaching Notes 8 (1), TN13-TN49, 2023 | | 2023 |