{\rtf1\ansi\deff0\deftab360 {\fonttbl {\f0\fswiss\fcharset0 Arial} {\f1\froman\fcharset0 Times New Roman} {\f2\fswiss\fcharset0 Verdana} {\f3\froman\fcharset2 Symbol} } {\colortbl; \red0\green0\blue0; } {\info {\author Biblio 7.x}{\operator }{\title Biblio RTF Export}} \f1\fs24 \paperw11907\paperh16839 \pgncont\pgndec\pgnstarts1\pgnrestart F. Shadbad, Bahr, G., Luse, A., and Hammer, B., ?Best of Both Worlds: The Inclusion of Gamification in Virtual Lab Environments to Increase Educational Value?, in Proceedings of the 56th Hawaii International Conference on System Sciences, 2023.\par \par A. Luse and Shadbad, F., ?Hackalytics: Using Computer Hacking to Engage Students in Analytics?, Journal of Information Systems Education, 2023.\par \par B. Marshall, Shadbad, F., Curry, M., and Biros, D., ?Do Measures of Security Compliance Intent Equal Non-Compliance Scenario Agreement??, in WISP2022: 2022 Workshop on Information Security and Privacy (WISP), Copenhagen, Denmark, Dec. 2022, 2022.\par \par B. Marshall, Shadbad, F., Curry, M., and Biros, D., ?Do Measures of Security Compliance Intent Equal Non-Compliance Scenario Agreement??, in WISP2022: 2022 Workshop on Information Security and Privacy (WISP), Copenhagen, Denmark, Dec. 2022, 2022.\par \par P. Kalgotra, Baham, C., Shadbad, F., and Sharda, R., ?Generational Differences in Perceiving the Technology Interruptions: A qualitative Study?, European Journal of Information Systems, pp. 1-21, 2022.\par \par B. Hammer and Shadbad, F., ?Psychological Contract Violations on Information Disclosure: A study of Interpersonal Arrangements and Trust Transference in Social Media Platforms?, Communications of the Association for Information Systems, 2022.\par \par M. Curry, Marshall, B., Shadbad, F., and Hong, S., ?Will SOC Telemetry Data Improve Predictive Models of User Riskiness? A Work in Progress?. Copenhagen, Denmark, Dec. 2022, 2022.\par \par F. Shadbad and Biros, D., ?Does Technostress Triger Insider Threat? A conceptual Model and Mitigation Solutions?, 2021.\par \par F. Shadbad and Biros, D., ?Understanding Employee Information Security Policy Compliance from Role Theory Perspective?, Journal of Computer Information Systems, 2021.\par \par F. Shadbad, Baham, C., and Biros, D., ?A Qualitative Approach to Understand Unintentional Information Security Misbehaviors?, in Americas Conference on Information Systems, 2020.\par \par F. Shadbad and Biros, D., ?Technostress and its Influence on Employee Information Security Policy Compliance?, Information Technology and People, 2020.\par \par F. Shadbad and Biros, D., ?Developing an Unintentional Information Security Misbehavior Scale (UISMS)?, in Proceeding of Midwest Association for Information Systems, 2019.\par \par F. Shadbad, Biros, D., and Sharma, M., ?Examining Technostress on Employees Security-related Behaviors?, INFORMS Annual Meeting. 2019.\par \par B. Hammer, Zhang, T., Shadbad, F., and Agrawal, R., ?Psychological Contract Violation and Sharing Intention on Facebook?, in Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019.\par \par }