Allen C. Johnston
Orcid: 0000-0003-0301-4187
According to our database1,
Allen C. Johnston
authored at least 58 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Introduction to the Minitrack on Innovative Behavioral IS Security and Privacy Research.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024
Intuition or Analysis? Investigation of Employees' Cognitive Mode of Information Security Policy Compliance.
Proceedings of the 30th Americas Conference on Information Systems: Elevating Life through Digital Social Entrepreneurship, 2024
2023
Peering through the lens of high-reliability theory: A competencies driven security culture model of high-reliability organisations.
Inf. Syst. J., September, 2023
Seeking rhetorical validity in fear appeal research: An application of rhetorical theory.
Comput. Secur., 2023
2022
Exposing the darkness within: A review of dark personality traits, models, and measures and their relationship to insider threats.
J. Inf. Secur. Appl., 2022
A neo-institutional perspective on the establishment of information security knowledge sharing practices.
Inf. Manag., 2022
Contextualizing Self-disclosure to the Online Environment: An Assessment of the Literature.
Commun. Assoc. Inf. Syst., 2022
From liking to not liking: A proposed experiment design to explore consumer perceptions of health wearable notifications.
Proceedings of the Australasian Conference on Information Systems, 2022
2021
The Future of Information Systems in a Post-COVID World by TC8 (Information Systems).
Proceedings of the Advancing Research in Information and Communication Technology, 2021
Proceedings of the Advancing Research in Information and Communication Technology, 2021
Individuals' privacy concerns and adoption of contact tracing mobile applications in a pandemic: A situational privacy calculus perspective.
J. Am. Medical Informatics Assoc., 2021
Proceedings of the 42nd International Conference on Information Systems, 2021
Understanding Unstable Information Systems Phenomena: A Punctuated Equilibrium Perspective.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021
2020
Introduction to the Minitrack on Innovative Behavioral IS Security and Privacy Research.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020
Proceedings of the 26th Americas Conference on Information Systems, 2020
Deployment of Information Security Practices: The High Reliability Theory Perspective.
Proceedings of the Australasian Conference on Information Systems, 2020
2019
It Takes a Village: Understanding the Collective Security Efficacy of Employee Groups.
J. Assoc. Inf. Syst., 2019
Speak their Language: Designing Effective Messages to Improve Employees' Information Security Decision Making.
Decis. Sci., 2019
Integrating Construal-level Theory in Designing Fear Appeals in IS Security Research.
Commun. Assoc. Inf. Syst., 2019
The Application of Operant Conditioning Theory in Employees' IS Security Behavioral Management.
Proceedings of the 40th International Conference on Information Systems, 2019
Proceedings of the 40th International Conference on Information Systems, 2019
Proceedings of the 40th International Conference on Information Systems, 2019
2018
Examining employee computer abuse intentions: insights from justice, deterrence and neutralization perspectives.
Inf. Syst. J., 2018
What could possibly go wrong? A multi-panel Delphi study of organizational social media risk.
Inf. Syst. Frontiers, 2018
Providing Theoretical Foundations: Developing an Integrated Set of Guidelines for Theory Adaptation.
Commun. Assoc. Inf. Syst., 2018
An Examination of Risk Perceptions and Protected Health Information Disclosure Intentions: A Construal Level Theory Perspective.
Proceedings of the 24th Americas Conference on Information Systems, 2018
2016
Neural Correlates of Protection Motivation for Secure IT Behaviors: An fMRI Examination.
J. Assoc. Inf. Syst., 2016
Dispositional and situational factors: influences on information security policy violations.
Eur. J. Inf. Syst., 2016
Decis. Support Syst., 2016
Commun. Assoc. Inf. Syst., 2016
2015
An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to the Human Asset Through Sanctioning Rhetoric.
MIS Q., 2015
Proceedings of the 2015 Information Security Curriculum Development Conference, 2015
2014
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014
2013
Engaging Remote Employees: The Moderating Role of "Remote" Status in Determining Employee Information Security Policy Awareness.
J. Organ. End User Comput., 2013
Online health communities: An assessment of the influence of participation on patient empowerment outcomes.
Inf. Technol. People, 2013
Int. J. Account. Inf. Syst., 2013
2012
Proceedings of the 18th Americas Conference on Information Systems, 2012
2011
The influence of the informal social learning environment on information privacy policy compliance efficacy and intention.
Eur. J. Inf. Syst., 2011
The Role of Perceptions of Organizational Injustice and Techniques of Neutralization in Forming Computer Abuse Intentions.
Proceedings of the A Renaissance of Information Technology for Sustainability and Global Competitiveness. 17th Americas Conference on Information Systems, 2011
2010
The Influence of Perceived Source Credibility on End User Attitudes and Intentions to Comply with Recommended IT Actions.
J. Organ. End User Comput., 2010
Reigning in the Remote Employee: Applying Social Learning Theory to Explain Information Security Policy Compliance Attitudes.
Proceedings of the Sustainable IT Collaboration Around the Globe. 16th Americas Conference on Information Systems, 2010
2009
Inf. Resour. Manag. J., 2009
Data Base, 2009
The Impact of National Culture on Workplace Privacy Expectations in the Context of Information Security Assurance.
Proceedings of the 15th Americas Conference on Information Systems, 2009
2008
J. Glob. Inf. Manag., 2008
Inf. Manag. Comput. Secur., 2008
Inf. Manag. Comput. Secur., 2008
2007
Proceedings of the Encyclopedia of Information Ethics and Security, 2007
Int. J. Inf. Secur. Priv., 2007
The IT Security Adoption Conundrum: An Initial Step Toward Validation of Applicable Measures.
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007
2006
User Interaction with Healthcare Information Systems: Do Healthcare Professionals Want to Comply with HIPAA?
Proceedings of the Connecting the Americas. 12th Americas Conference on Information Systems, 2006
Proceedings of the Connecting the Americas. 12th Americas Conference on Information Systems, 2006
2004
Proceedings of the 10th Americas Conference on Information Systems, 2004