- Luse, A., Rursch, J. (2021) “Using a Virtual Lab Network Testbed to Facilitate Real-World Hands-on Learning in a Networking Course,” British Journal of Educational Technology, Volume , Issue , pp. .
- Luse, A., Brown, A., Rursch, J. (2021) “Instruction in 802.11 Technology in Online Virtual Labs,” IEEE Transactions on Education, Volume 64, Issue 1, pp. 12-17.
- Luse, A., Burkman, J. (2021) “Gophish: Implementing a Real-World Phishing Exercise to Teach Social Engineering,” Journal of Cybersecurity Education, Research & Practice, Volume 2020, Issue 2, Article 5.
- Luse, A., Burkman, J., Steelman, S. (2020) “This Isn’t Your Parent’s TV Show…Oh Wait, It Is,” Drake Management Review, Volume 10, Issue 1, pp. 1-11.
- Kalgotra, P., Sharda, R., Luse, A. (2020) “Which Similarity Measure to Use in Network Analysis: Impact of Sample Size on Phi Correlation Coefficient and Ochiai Coefficient based Networks,” International Journal of Information Management, Volume 55, pp. 1-10.
- Luse, A., Burkman, J. (2020) “Wearables in the Workplace: Examination Using a Privacy Boundary Model,” Journal of the Midwest Association for Information Systems, Volume 2020, Issue 2, pp. 7-15.
- Davazdahemami, B., Hammer, B., Kalgotra, P., Luse, A. (2020) “From General to Situational Privacy Concerns: A New Mechanism to Explain Information Disclosure in Social Networks,” Communications of the Association for Information Systems, Volume 47, pp. 652-677.
- Liang, N., Biros, D., Glancy, F., Luse, A. (2020) “Classification of Malicious Insiders and the Association of the Forms of Attacks,” Journal of Criminal Psychology, Volume 10, Issue 3, pp. 233-247.
- Luse, A., Townsend, A.M., Mennecke, B. (2018) “The Blocking Effect of Preconceived Bias,” Decision Support Systems, Volume 108, pp. 25-33.
- Davazdahemami, B., Luse, A., Scheibe, K., Townsend, A.M. (2018) “Training, Self-Efficacy, and Performance; a Replication Study,” AIS Transactions on Replication Research, Volume 4, Issue 1, pp. 1-18.
- Luse, A., Al Marzooq, A., Burkman, J. (2018) “Windows Me: Using Antiquated Software to Learn about Security,” IEEE Potentials, Volume 37, Issue 2, pp. 10-12.
- Luse, A., Burkman, J. (2018) “Safely Using Real-World Data for Teaching Statistics: A Comparison of Student Performance and Perceived Realism between Dataset Types,” Journal of the Midwest Association for Information Systems, Volume 2018, Issue 1, pp. 11-22.
- Luse, A., Hammer, B. (2017) “High School Introductory Programming on Raspberry Pi Made From Scratch,” International Journal of People-Oriented Programming, Volume 6, Issue 2, pp. 33-45.
- Wang, D., Luse, A., Burkman, J. (2016) “Dynamic visualization of time-based changes to data generated by Reddit.com: The Real Time Conversation Project,” American Journal of Undergraduate Research, Volume 13, Issue 4, pp. 59-68.
- Liang, N., Biros, D., Luse, A. (2016) “An Empirical Validation of Malicious Insider Characteristics,” Journal of Management Information Systems, Volume 33, Issue 2, pp. 361-392.
- Laux, D., Luse, A., Mennecke, B. (2016) “Collaboration, Connectedness, and Community: An examination of the factors Influencing Student Persistence in Virtual Communities,” Computers in Human Behavior, Volume 57, pp. 452-464.
- Luse, A. (2015) “Estimating Random Effects in Multilevel Structural Equation Models Using Mplus,” Journal of the Midwest Association for Information Systems, Volume 2015, Issue 2, pp. 31-52.
- Carlson, P., Peters, A., Gilbert, S.B., Vance, J.M., Luse, A. (2015) “Virtual Training: Learning Transfer of Assembly Tasks,” IEEE Transactions on Visualization and Computer Graphics, Volume 21, Issue 6, pp. 770-782. (https://youtu.be/aAxBykcL32M)
- Wang, Y., Townsend, A., Mennecke, B., Luse, A. (2014) “Understanding the Moderating Roles of Types of Recommender Systems and Products on Customer Behavioral Intention to Use Recommender Systems,” Information Systems and e‑Business Management, pp. 1-31.
- Luse, A., Rursch, J., Jacobson, D. (2014) “Utilizing Structural Equation Modeling and Social Cognitive Career Theory to Identify Factors in Choice of IT as a Major,” ACM Transactions on Computing Education, Volume 14, Issue 3, pp. 1-19.
- Schiller, S., Mennecke, B., Nah, F., Luse, A. (2014) “Institutional Boundaries and Trust of Virtual Teams in Collaborative Design: An Experimental Study in a Virtual World Environment,” Computers in Human Behavior, Volume 35, pp. 565-577.
- Luse, A., Mennecke, B. (2014) “IT Can Matter: Co-Evolution Fostering IT Competitive Advantage,” Management Research Review, Volume 37, Issue 6, pp. 574-588.
- Luse, A., Mennecke, B., Townsend, A.M., Jacobson, D. (2014) “Employing Interactive Maps to Increase User Utilization of Visualization Mechanisms for Network Security Management,” Journal of Information Systems Security, Volume 8, Issue 3, pp. 61-85.
- Luse, A., McElroy, J.C., Townsend, A.M., DeMarie, S. (2013) “Personality and Cognitive Style as Predictors of Preference for Working in Virtual Teams,” Computers in Human Behavior, Volume 29, Issue 4, pp. 1825-1832.
- Luse, A., Mennecke, B., Triplett, J. (2013) “The Changing Nature of User Attitudes Toward Virtual World Technology: A Longitudinal Study,” Computers in Human Behavior, Volume 29, Issue 3, pp. 1122-1132.
- Luse, A., Mennecke, B., Townsend, A.M. (2012) “Selecting a Research Topic: A Framework for Doctoral Students,” International Journal of Doctoral Studies, Volume 7, pp. 143-153.
- Luse, A., Mennecke, B., Triplett, J., Karstens, N., Jacobson, D. (2011) “A Design Methodology and Implementation for Corporate Network Security Visualization: A Modular-Based Approach,” AIS Transactions on Human-Computer Interaction, Volume 3, Issue 2, pp. 104-132. Accepted by editors Alan Hevner and Ping Zhang.
- Laux, D., Luse, A., Mennecke, B., Townsend, A.M. (2011). “Adoption of Biometric Authentication Systems: Implications for Research and Practice in the Deployment of End-User Security Systems,” Journal of Organizational Computing and Electronic Commerce, Volume 21, Issue 3, pp. 221-245.
- Luse, A, Mennecke, B., Townsend, A.M. (2010). “User Acceptance of Speech-Enabled Technologies for Configuration of Computer and Network Security,” Journal of Information Privacy and Security, Volume 6, Issue 4, pp. 28-49.
- Luse, A., Mennecke, B., Townsend, A.M. (2010). “Improving Direction-Giving Through Utilization of an RFID-Enabled Kiosk,” International Journal of Advanced Pervasive and Ubiquitous Computing, Volume 2, Issue 2, pp. 45-56.
- Rursch, J., Luse, A., Jacobson, D. (2010). “IT-Adventures — A Program to Spark IT Interest in High School Students using Inquiry-Based Learning with Robotics, Game Design, and Cyber Defense,” IEEE Transactions on Education, Volume 53, Issue 1, pp. 71-79.
- Luse, A., Mennecke, B., Townsend, A.M. (2009). “Electronic Forms-based Computing for Evidentiary Analysis,” Journal of Digital Forensics, Security, and Law, Volume 4, Issue 3, pp. 17-34.
- Luse, A., Scheibe, K.P., Townsend, A.M. (2009). “Addressing Internal Security Threats with Roaming User-Based Distributed Firewalls,” Journal of Information Systems Security, Volume 5, Issue 2, pp. 26-41.
- Luse, A., Townsend, A.M., Scheibe, K.P. (2008). “Software Implementation using Hardware-Based Verification for Secure Content Delivery,” Journal of Information Warfare, Volume 7, Issue 2, pp. 11-23.
- Luse, A., Scheibe, K.P., Townsend, A.M. (2008). “A Component-Based Framework for Visualization of Intrusion Detection Events,” Information Security Journal, Volume 17, Issue 2, pp. 95-107.
- Scheibe, K.P., Mennecke, B., Luse, A. (2007). “The Role of Effective Modeling in the Development of Self-efficacy: The Case of the Transparent Engine,” Decision Sciences Journal of Innovative Education, Volume 5, Issue 1, pp. 21-42.