


default search action
Obi Ogbanufe
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j18]Obi Ogbanufe, Mary C. Jones, Julie I. Hancock:
Job demands, identity, and outcomes: The mediating role of cynicism among Cybersecurity-focused employees. Comput. Secur. 150: 104277 (2025) - [j17]Joshua M. Davis, Deepti Agrawal, Obi Ogbanufe:
Shaping extra-role security behaviors through employee-agent relations: A dual-channel motivational perspective. Int. J. Inf. Manag. 80: 102833 (2025) - 2023
- [j16]Obi Ogbanufe
, Robert E. Crossler
, David Biros:
The valued coexistence of protection motivation and stewardship in information security behaviors. Comput. Secur. 124: 102960 (2023) - [j15]Obi Ogbanufe
, Ling Ge:
A comparative evaluation of behavioral security motives: Protection, intrinsic, and identity motivations. Comput. Secur. 128: 103136 (2023) - [j14]Debalina Bera, Obi Ogbanufe, Dan J. Kim:
Towards a thematic dimensional framework of online fraud: An exploration of fraudulent email attack tactics and intentions. Decis. Support Syst. 171: 113977 (2023) - [j13]Obi Ogbanufe:
Securing online accounts and assets: An examination of personal investments and protection motivation. Int. J. Inf. Manag. 68: 102590 (2023) - [j12]Obi Ogbanufe, Corey Baham:
Using Multi-Factor Authentication for Online Account Security: Examining the Influence of Anticipated Regret. Inf. Syst. Frontiers 25(2): 897-916 (2023) - [c9]Obi Ogbanufe, Ludwig Christian Schaupp, France Bélanger:
Sharenting, Parenting, and Identifying: Can Privacy Prevail? HICSS 2023: 4453-4461 - 2022
- [j11]Obi Ogbanufe
, Natalie Gerhart:
Exploring smart wearables through the lens of reactance theory: Linking values, social influence, and status quo. Comput. Hum. Behav. 127: 107044 (2022) - [j10]Obi Ogbanufe
, Robert Pavur:
Going through the emotions of regret and fear: Revisiting protection motivation for identity theft protection. Int. J. Inf. Manag. 62: 102432 (2022) - [j9]Natalie Gerhart, Obi Ogbanufe
, Russell Torres, Anna Sidorova, Nicholas E. Evangelopoulos:
Effort Minimization Theory in the Data Analytics Era. J. Comput. Inf. Syst. 62(4): 837-849 (2022) - 2021
- [j8]Obi Ogbanufe
:
Enhancing End-User Roles in Information Security: Exploring the Setting, Situation, and Identity. Comput. Secur. 108: 102340 (2021) - [j7]Obi Ogbanufe
, Robert E. Crossler
, David Biros:
Exploring stewardship: A precursor to voluntary security behaviors. Comput. Secur. 109: 102397 (2021) - [j6]Obi Ogbanufe
, Dan J. Kim
, Mary C. Jones:
Informing cybersecurity strategic commitment through top management perceptions: The role of institutional pressures. Inf. Manag. 58(7): 103507 (2021) - 2020
- [j5]Obi Ogbanufe
, Natalie Gerhart:
The mediating influence of smartwatch identity on deep use and innovative individual performance. Inf. Syst. J. 30(6): 977-1009 (2020) - [c8]Obi Ogbanufe:
"Information Security Is Not Really My Job": Exploring Information Security Role Identity in End-Users. HICSS 2020: 1-8 - [c7]Obi Ogbanufe, Dan Kim:
Confirmatory Influence of Trust in E-commerce: A Data Collection Bias and Suggestion. HICSS 2020: 1-10
2010 – 2019
- 2019
- [j4]Obi Ogbanufe
, Catalin C. Dinulescu
, Xiaotong Liu, Carullah Y. Kucuk:
It's in the Cloud: Theorizing Context-Specific Factors Influencing the Perception of Mobile Cloud Storage. Data Base 50(3): 116-137 (2019) - [c6]Obi Ogbanufe:
"Information Security Is Not Really My Job": Increasing Information Security Role Identity Salience in End-users. AMCIS 2019 - 2018
- [j3]Obi Ogbanufe
, Dan J. Kim:
Comparing fingerprint-based biometrics authentication versus traditional authentication methods for e-payment. Decis. Support Syst. 106: 1-14 (2018) - [j2]Obi Ogbanufe
, Natalie Gerhart:
Watch It! Factors Driving Continued Feature Use of the Smartwatch. Int. J. Hum. Comput. Interact. 34(11): 999-1014 (2018) - [j1]Obi Ogbanufe
, Dan J. Kim:
"Just how risky is it anyway?" The role of risk perception and trust on click-through intention. Inf. Syst. Manag. 35(3): 182-200 (2018) - [c5]Obi Ogbanufe:
The Mediating Role of Psychological Ownership in Increasing Information Security Stewardship Behaviors. AMCIS 2018 - 2017
- [c4]Obi Ogbanufe, Dan J. Kim:
Hackers Delight: Knowledge Sharing Motives. AMCIS 2017 - [c3]Obi Ogbanufe, Dan J. Kim:
"Thanks for Sharing": Using Hacker Forum Data for Prediction of Knowledge Sharing and Withholding Behaviors. ICIS 2017 - 2016
- [c2]Obi Ogbanufe, Dan Kim, Hassan Takabi:
Top Manager's Perspectives on Cyberinsurance Risk Management for Reducing Cybersecurity Risks. AMCIS 2016 - 2015
- [c1]Dan Kim, Obi Ogbanufe:
Beyond Security and Privacy Perception: An Approach to Biometric Authentication Perception Change. AMCIS 2015
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-10 19:36 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint