Dooley, P., Levy, Y., Hackney, R., Parrish, J. L. (2018). Critical value factors in business intelligence systems implementations. Analytics and Data Science. 55-78. Springer International Publishing AG. https://link.springer.com/chapter/10.1007/978-3-319-58097-5_6
Parrish, J. L., Courtney, J. F. (2012). Inquiring Systems: Theoretical Foundations for Current and Future Information Systems. Information Systems Theory. 387–396. Springer New York.
Parrish, J. L., Courtney, Jr, J. F. (2008). Information Technology Support for Inquiring Organizations. Handbook on Decision Support Systems 2. 637–650. Springer Berlin Heidelberg.
Bhagat, S., Kim, D., Parrish, J. L. (2020). Disinformation in Social Media: Role of Dark Triad Personality Traits and Self Regulation. AMCIS 2020 Proceedings.
Withers, K., Parrish, J. L., Smith, J. N., Ellis, T. (2020). Vice or Virtue? Exploring the Dichotomy of an Offensive Security Engineer and Government “Hack Back” Policies. Proceedings of the 53rd Hawiian International Conference on Systems Sciences.
Smith, J. N., Green, A., Peiron, T., Parrish, J. L. (2019). Towards a Taxonomy of Information Spillage and Leakage. Proceedings of the Southern AIS Conference.
Green, A., Parrish, J. L., Smith, J. N., Thatcher, J. B. (2018). Social Networking Site Use, Risk, and Executive Behavior. Proceedings of the pre-ICIS WISP.
Bhagat, S., Parrish, J. L. (2018). Examining the Role of Information Quality, Relevance, Expertise in News Sharing on Social Media. AMCIS 2018 Proceedings. aisel.aisnet.org
Winkfield, M. A., Parrish, J. L., Tejay, G. (2017). Information Systems Security Leadership: An Empirical Study of Behavioral Influences. AMCIS 2017 Proceedings.
Landress, A. D., Parrish, J. L., Terrell, S. (2017). Resiliency as an Outcome of Security Training and Awareness Programs. AMCIS 2017 Proceedings.
Withers, K. L., Parrish, J. L., Terrell, S., Ellis, T. J. (2017). The Relationship between the “Dark Triad” Personality Traits and Deviant Behavior on Social Networking Sites. AMCIS 2017 Proceedings.
Alharthi, S., Parrish, J. L. (2017). The Role of Gamification in Motivating User Participation in Requirements Determinations. SAIS 2017 Proceedings.
Hackney, R., Dooley, P., Levvy, Y., Parrish, J. L. (2015). Critical value factors in business intelligence systems implementation success: An empirical analysis of system and information quality.
Parrish, J. L., Courtney, J. F. (2015). New Inquiring Systems as Kernel Theories for Knowledge Management: The Case of the Sense Man System. System Sciences (HICSS), 2015 48th Hawaii International Conference on. 4007–4016.
Topi, H., Barker, L., Thatcher, J., Nelson, M., Parrish, J. L. (2014). INTEGRATIVE PERSPECTIVES ON COMPUTING EDUCATION RESEARCH: A PANEL BUILDING ON PACE WORKSHOP.
SanNicolas-Rocca, T., Parrish, J. L. (2013). Using social media to capture and convey cultural knowledge: A case of chamorro people. System Sciences (HICSS), 2013 46th Hawaii International Conference on. 3386–3395.
Stalker, J. L., Levy, Y., Eshet, Y., Parrish, J. L. (2012). A reading preference and risk taxonomy for printed proprietary information compromise in the aerospace and defense industry. SIGSEC.
Parrish, J. L. (2012). Adding Security to the Early Phases of the SDLC through Conceptual Modeling.
Parrish, J. L., Nicolas-Rocca, S., others, (2012). Toward Better Decisions With Respect To Is Security: Integrating Mindfulness Into IS Security Training. Proceedings of the Seventh Pre-ICIS Workshop on Information Security and Privacy. 1, .
Courtney, J. F., Brewer, K. L., Graham, J. C., Parrish, J. L. (2011). DSS & knowledge management in inquiring organizations: An update. System Sciences (HICSS), 2011 44th Hawaii International Conference on. 1–9.
Parrish, J. L., Bailey, J. L., Jensen, B. (2011). Threat Modeling Social Engineering Threats by Conceptualizing Users as Systems.
Richardson, S. M., Parrish, J. L., Rosenthal, D. A. (2011). Toward a Theory of Emergent Leadership for Collaborative Information Systems Development among Social Enterprises.. AMCIS.
Parrish, J. L., Jensen, B., Bailey, J. L. (2010). A Threat Identification Matrix for the Protection of Critical Infrastructures Refereed Research Paper.
Parrish, J. L., Jensen, A. A. (2010). Toward User-Centric Security Policies for Mobile Device Usage.
Parrish, J. L., Bailey, J., Jensen, B. (2010). Using the imagine cup SDI as the foundation for computer science capstone projects. Proceedings of the 41st ACM technical symposium on Computer science education. 68–71.
Parrish, J. L., Bailey, J. L., Courtney, J. F. (2009). A personality based model for determining susceptibility to phishing attacks.
Parrish, J. L., Bailey, J. L., Jensen, B. (2009). DESIGNING SECURE INFORMATION SYSTEMS: AN EXAMINATION OF THE TREATMENT OF SECURITY IN SYSTEMS ANALYSIS AND DESIGN TEXTBOOKS.
Parrish, J. L., Bailey, J., Jensen, B. (2009). The Imagine Cup Software Development Invitational: Implications for Use in the IS Capstone Course. Other. 453.
Parrish, J. L., Kuhn, Jr, J. R., Courtney, J. F. (2008). Mindful Administration of IS Security Policies. Other. 270.
Parrish, J. L., Courtney, J. (2007). A Dialectical Sensemaking Model for Making Electronic Record Control Practice Decisions. Other. 197.
Parrish, J. L. (2000). Power Issues in G2G E-Government Applications. Other. 3, 1–2006.
Hanus, B., Wu, Y., Parrish, J. L. (2021). Phish me, phish me not: Analysis of Phishing Antecedents in Humans. Journal of Computer Information Systems. March 2021, .
Paradice, D., Parrish, J. L., Richardson, S. (2019). What really happens in DSR: A micro- and macro-level analysis of a 30 year DSR project stream. Communications of the Association for Information Systems. 45(19), 19. Atlanta, GA: AIS. to https://mc.manuscriptcentral.com/cais
Vedder, R. G., Guynes, C. S., Parrish, J. L. (2018). Botsourcing’s Impact on Society. ACM SIGCAS Computers and Society. 48(2), .
Brown, S. D., Levy, Y., Ramim, M. M., Parrish, J. L. (2015). Pharmaceutical companies’ documented and online privacy practices: Development of an index measure and initial test. Other. 3(2), 68–88.
San Nicolas-Rocca, T., Parrish, J. L. (2013). Capturing and Conveying Chamorro Cultural Knowledge Using Social Media. Other. 9(3), 1–18. IGI Global.
Spears, J. L., Parrish, J. L. (2013). IS security requirements identification from conceptual models in systems analysis and design: The fun & fitness, inc. case. Journal of Information Systems Education. 24(1), 17. EDSIG.
Parrish, J. L. (2010). PAPA knows best: Principles for the ethical sharing of information on social networking sites. Ethics and Information Technology. 12(2), 187–193. Springer Netherlands.
Parrish, J. L., Courtney, Jr, J. F. (2009). Churchman’s inquirers as design templates for knowledge management systems. Communications of the ACM. 52(7), 126–129. ACM.
Linden, L. P., Kuhn, Jr, J. R., Parrish, J. L., Richardson, S. M., Adams, L. A., Elgarah, W., Courtney, J. F. (2007). Churchman’s inquiring systems: Kernel theories for knowledge management. Communications of the Association for Information Systems. 20(1), 52.
Parrish, J. L., Courtney, J. F. (2007). Electronic records management in local government agencies: the case of the clerk of courts office in Lake County Florida. Information Systems Management. 24(3), 223–229. Taylor & Francis Group.