Follow
Ernst Bekkering
Ernst Bekkering
Professor of Computer Science, Northeastern State University
Verified email at nsuok.edu
Title
Cited by
Cited by
Year
Trust in videoconferencing
E Bekkering, JP Shim
Communications of the ACM 49 (7), 103-107, 2006
1132006
MDFC–ResNet: an agricultural IoT system to accurately recognize crop diseases
WJ Hu, J Fan, YX Du, BS Li, N Xiong, E Bekkering
IEEE Access 8, 115287-115298, 2020
1062020
Introducing the check-off password system (COPS): an advancement in user authentication methods and information security
M Warkentin, K Davis, E Bekkering
Journal of Organizational and End User Computing (JOEUC) 16 (3), 41-58, 2004
692004
Analysis of systems development project risks: An integrative framework
M Warkentin, RS Moore, E Bekkering, AC Johnston
ACM SIGMIS Database: the DATABASE for Advances in Information Systems 40 (2 …, 2009
682009
Steganography: Forensic, security, and legal issues
M Warkentin, E Bekkering, MB Schmidt
Journal of Digital Forensics, Security and Law 3 (2), 2, 2008
312008
Steganography and steganalysis
M Warkentin, MB Schmidt, E Bekkering
Enterprise Information Systems Assurance and System Security: Managerial and …, 2006
222006
Class Participation and Student Performance: A Tale of Two Courses.
E Bekkering, T Ward
Information Systems Education Journal 18 (6), 86-98, 2020
172020
An empirical assessment of technology adoption as a choice between alternatives
E Bekkering, AC Johnston, M Warkentin, MB Schmidt
Information Resources Management Journal (IRMJ) 22 (4), 23-44, 2009
142009
Using remote desktop applications in education
D Hutchison, E Bekkering
Hutchison and Bekkering, Proc ISECON 24, 2007
132007
Empirical findings on perceived value of mobile commerce as a distribution channel
JP Shim, E Bekkering, L Hall
AMCIS 2002 Proceedings, 252, 2002
132002
A follow-up study of detecting phishing emails
E Bekkering, D Hutchison, L Werner
Proceedings of the Conference on Information Systems Applied Research …, 2009
102009
Class Participation and Student Performance: A Follow-Up Study.
E Bekkering, T Ward
Information Systems Education Journal 19 (4), 77-91, 2021
82021
Digital Steganography—An Introduction to Techniques and Tools
MB Pope, M Warkentin, E Bekkering, MB Schmidt
Communications of the Association for Information Systems 30 (1), 22, 2012
82012
Design and analysis of a data fusion scheme in mobile wireless sensor networks based on multi-protocol mobile agents
C Wu, W Wu, C Wan, E Bekkering, N Xiong
Sensors 17 (11), 2523, 2017
72017
A follow-up study of using remote desktop applications in education
E Bekkering, D Hutchison
Information Systems Education Journal 7 (55), 1-13, 2009
72009
A proposed study and analysis of user perceptions of biometric acceptance
MB Schmidt, D Das, V Kumar, E Bekkering
Proceedings of the 39th Annual Meeting of the Decision Sciences Institute …, 2008
72008
Proposed study of end-user perceptions regarding Tablet PCs
M Warkentin, E Bekkering, M Schmidt, A Johnston
Innovations Through Information Technology: 2004 Information Resources …, 2004
52004
A longitudinal comparison of four password procedures
E Bekkering, M Warkentin, K Davis
Proceedings of the 2003 Hawaii International Conference on Business …, 2003
52003
Steganography
M Warkentin, MB Schmidt, E Bekkering
Cyber warfare and cyber terrorism, 50-56, 2007
42007
IT security management practices: successes and failures in coping with Blaster and Sobig. F
AC Johnston, MB Schmidt, E Bekkering
Proceedings of the 2004 ISOneWorld International Conference, 1-12, 2004
42004
The system can't perform the operation now. Try again later.
Articles 1–20