MDFC–ResNet: an agricultural IoT system to accurately recognize crop diseases WJ Hu, J Fan, YX Du, BS Li, N Xiong, E Bekkering IEEE Access 8, 115287-115298, 2020 | 120 | 2020 |
Trust in videoconferencing E Bekkering, JP Shim Communications of the ACM 49 (7), 103-107, 2006 | 113 | 2006 |
Introducing the check-off password system (COPS): an advancement in user authentication methods and information security M Warkentin, K Davis, E Bekkering Journal of Organizational and End User Computing (JOEUC) 16 (3), 41-58, 2004 | 71 | 2004 |
Analysis of systems development project risks: An integrative framework M Warkentin, RS Moore, E Bekkering, AC Johnston ACM SIGMIS Database: the DATABASE for Advances in Information Systems 40 (2 …, 2009 | 68 | 2009 |
Steganography: Forensic, security, and legal issues M Warkentin, E Bekkering, MB Schmidt Journal of Digital Forensics, Security and Law 3 (2), 2, 2008 | 32 | 2008 |
Steganography and steganalysis M Warkentin, MB Schmidt, E Bekkering Enterprise Information Systems Assurance and System Security: Managerial and …, 2006 | 22 | 2006 |
Class Participation and Student Performance: A Tale of Two Courses. E Bekkering, T Ward Information Systems Education Journal 18 (6), 86-98, 2020 | 18 | 2020 |
An empirical assessment of technology adoption as a choice between alternatives E Bekkering, AC Johnston, M Warkentin, MB Schmidt Information Resources Management Journal (IRMJ) 22 (4), 23-44, 2009 | 14 | 2009 |
Using remote desktop applications in education D Hutchison, E Bekkering Hutchison and Bekkering, Proc ISECON 24, 2007 | 13 | 2007 |
Empirical findings on perceived value of mobile commerce as a distribution channel JP Shim, E Bekkering, L Hall AMCIS 2002 Proceedings, 252, 2002 | 13 | 2002 |
Class Participation and Student Performance: A Follow-Up Study. E Bekkering, T Ward Information Systems Education Journal 19 (4), 77-91, 2021 | 10 | 2021 |
A follow-up study of detecting phishing emails E Bekkering, D Hutchison, L Werner Proceedings of the Conference on Information Systems Applied Research …, 2009 | 10 | 2009 |
Digital Steganography—An Introduction to Techniques and Tools MB Pope, M Warkentin, E Bekkering, MB Schmidt Communications of the Association for Information Systems 30 (1), 22, 2012 | 8 | 2012 |
Design and analysis of a data fusion scheme in mobile wireless sensor networks based on multi-protocol mobile agents C Wu, W Wu, C Wan, E Bekkering, N Xiong Sensors 17 (11), 2523, 2017 | 7 | 2017 |
A follow-up study of using remote desktop applications in education E Bekkering, D Hutchison Information Systems Education Journal 7 (55), 1-13, 2009 | 7 | 2009 |
A proposed study and analysis of user perceptions of biometric acceptance MB Schmidt, D Das, V Kumar, E Bekkering Proceedings of the 39th Annual Meeting of the Decision Sciences Institute …, 2008 | 7 | 2008 |
Proposed study of end-user perceptions regarding Tablet PCs M Warkentin, E Bekkering, M Schmidt, A Johnston Innovations Through Information Technology: 2004 Information Resources …, 2004 | 5 | 2004 |
A longitudinal comparison of four password procedures E Bekkering, M Warkentin, K Davis Proceedings of the 2003 Hawaii International Conference on Business …, 2003 | 5 | 2003 |
Steganography M Warkentin, MB Schmidt, E Bekkering Cyber warfare and cyber terrorism, 50-56, 2007 | 4 | 2007 |
IT security management practices: successes and failures in coping with Blaster and Sobig. F AC Johnston, MB Schmidt, E Bekkering Proceedings of the 2004 ISOneWorld International Conference, 1-12, 2004 | 4 | 2004 |