Allen C. Johnston

Orcid: 0000-0003-0301-4187

According to our database1, Allen C. Johnston authored at least 58 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Introduction to the Minitrack on Innovative Behavioral IS Security and Privacy Research.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

Intuition or Analysis? Investigation of Employees' Cognitive Mode of Information Security Policy Compliance.
Proceedings of the 30th Americas Conference on Information Systems: Elevating Life through Digital Social Entrepreneurship, 2024

2023
Peering through the lens of high-reliability theory: A competencies driven security culture model of high-reliability organisations.
Inf. Syst. J., September, 2023

Seeking rhetorical validity in fear appeal research: An application of rhetorical theory.
Comput. Secur., 2023

2022
Exposing the darkness within: A review of dark personality traits, models, and measures and their relationship to insider threats.
J. Inf. Secur. Appl., 2022

A neo-institutional perspective on the establishment of information security knowledge sharing practices.
Inf. Manag., 2022

Contextualizing Self-disclosure to the Online Environment: An Assessment of the Literature.
Commun. Assoc. Inf. Syst., 2022

From liking to not liking: A proposed experiment design to explore consumer perceptions of health wearable notifications.
Proceedings of the Australasian Conference on Information Systems, 2022

2021
The Future of Information Systems in a Post-COVID World by TC8 (Information Systems).
Proceedings of the Advancing Research in Information and Communication Technology, 2021


Individuals' privacy concerns and adoption of contact tracing mobile applications in a pandemic: A situational privacy calculus perspective.
J. Am. Medical Informatics Assoc., 2021

Smart Pay-As-You-Live Services in Healthcare: A Balance Theory Perspective.
Proceedings of the 42nd International Conference on Information Systems, 2021

Understanding Unstable Information Systems Phenomena: A Punctuated Equilibrium Perspective.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

2020
Introduction to the Minitrack on Innovative Behavioral IS Security and Privacy Research.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

Security in the Software Development Process: Role of Human Factors.
Proceedings of the 26th Americas Conference on Information Systems, 2020

Deployment of Information Security Practices: The High Reliability Theory Perspective.
Proceedings of the Australasian Conference on Information Systems, 2020

2019
It Takes a Village: Understanding the Collective Security Efficacy of Employee Groups.
J. Assoc. Inf. Syst., 2019

Speak their Language: Designing Effective Messages to Improve Employees' Information Security Decision Making.
Decis. Sci., 2019

Integrating Construal-level Theory in Designing Fear Appeals in IS Security Research.
Commun. Assoc. Inf. Syst., 2019

The Application of Operant Conditioning Theory in Employees' IS Security Behavioral Management.
Proceedings of the 40th International Conference on Information Systems, 2019

How Much is Too Much: Employee Monitoring, Surveillance, and Strain.
Proceedings of the 40th International Conference on Information Systems, 2019

Designing Experimental Studies.
Proceedings of the 40th International Conference on Information Systems, 2019

2018
Examining employee computer abuse intentions: insights from justice, deterrence and neutralization perspectives.
Inf. Syst. J., 2018

What could possibly go wrong? A multi-panel Delphi study of organizational social media risk.
Inf. Syst. Frontiers, 2018

Providing Theoretical Foundations: Developing an Integrated Set of Guidelines for Theory Adaptation.
Commun. Assoc. Inf. Syst., 2018

An Examination of Risk Perceptions and Protected Health Information Disclosure Intentions: A Construal Level Theory Perspective.
Proceedings of the 24th Americas Conference on Information Systems, 2018

2016
Neural Correlates of Protection Motivation for Secure IT Behaviors: An fMRI Examination.
J. Assoc. Inf. Syst., 2016

Dispositional and situational factors: influences on information security policy violations.
Eur. J. Inf. Syst., 2016

Continuance of protective security behavior: A longitudinal study.
Decis. Support Syst., 2016

A Broader View of Perceived Risk during Internet Transactions.
Commun. Assoc. Inf. Syst., 2016

2015
An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to the Human Asset Through Sanctioning Rhetoric.
MIS Q., 2015

Undergraduate student perceptions of personal social media risk.
Proceedings of the 2015 Information Security Curriculum Development Conference, 2015

2014
Introduction to Innovative Behavioral IS Security and Privacy Research Minitrack.
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014

2013
Engaging Remote Employees: The Moderating Role of "Remote" Status in Determining Employee Information Security Policy Awareness.
J. Organ. End User Comput., 2013

Online health communities: An assessment of the influence of participation on patient empowerment outcomes.
Inf. Technol. People, 2013

Social network analysis in accounting information systems research.
Int. J. Account. Inf. Syst., 2013

Future directions for behavioral information security research.
Comput. Secur., 2013

2012
The Role of Individual Characteristics on Insider Abuse Intentions.
Proceedings of the 18th Americas Conference on Information Systems, 2012

2011
The influence of the informal social learning environment on information privacy policy compliance efficacy and intention.
Eur. J. Inf. Syst., 2011

The Role of Perceptions of Organizational Injustice and Techniques of Neutralization in Forming Computer Abuse Intentions.
Proceedings of the A Renaissance of Information Technology for Sustainability and Global Competitiveness. 17th Americas Conference on Information Systems, 2011

2010
Fear Appeals and Information Security Behaviors: An Empirical Study.
MIS Q., 2010

The Influence of Perceived Source Credibility on End User Attitudes and Intentions to Comply with Recommended IT Actions.
J. Organ. End User Comput., 2010

Impact of Negative Message Framing on Security Adoption.
J. Comput. Inf. Syst., 2010

Reigning in the Remote Employee: Applying Social Learning Theory to Explain Information Security Policy Compliance Attitudes.
Proceedings of the Sustainable IT Collaboration Around the Globe. 16th Americas Conference on Information Systems, 2010

2009
An Empirical Assessment of Technology Adoption as a Choice between Alternatives.
Inf. Resour. Manag. J., 2009

Analysis of systems development project risks: an integrative framework.
Data Base, 2009

Improved security through information security governance.
Commun. ACM, 2009

The Impact of National Culture on Workplace Privacy Expectations in the Context of Information Security Assurance.
Proceedings of the 15th Americas Conference on Information Systems, 2009

2008
A Cross-Cultural Comparison of U.S. and Chinese Computer Security Awareness.
J. Glob. Inf. Manag., 2008

Information security management objectives and practices: a parsimonious framework.
Inf. Manag. Comput. Secur., 2008

Information privacy compliance in the healthcare industry.
Inf. Manag. Comput. Secur., 2008

2007
Mitigation of Identity Theft in the Information Age.
Proceedings of the Encyclopedia of Information Ethics and Security, 2007

Rootkits and What we Know: Assessing US and Korean Knowledge and Perceptions.
Int. J. Inf. Secur. Priv., 2007

The IT Security Adoption Conundrum: An Initial Step Toward Validation of Applicable Measures.
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007

Risk Perspectives in Systems Development.
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007

2006
User Interaction with Healthcare Information Systems: Do Healthcare Professionals Want to Comply with HIPAA?
Proceedings of the Connecting the Americas. 12th Americas Conference on Information Systems, 2006

Personality and IT security: An application of the five-factor model.
Proceedings of the Connecting the Americas. 12th Americas Conference on Information Systems, 2006

2004
Wireless Network Security in Hospitality SMEs.
Proceedings of the 10th Americas Conference on Information Systems, 2004


  Loading...