Anthony Vance
Orcid: 0000-0002-4554-6176
According to our database1,
Anthony Vance
authored at least 54 papers
between 2005 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
2005
2010
2015
2020
2025
0
1
2
3
4
5
6
7
8
1
1
1
1
1
3
1
4
2
2
2
6
1
2
1
2
2
1
4
1
1
1
2
3
2
1
1
1
1
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
What do we need to know about the Chief Information Security Officer? A literature review and research agenda.
Comput. Secur., 2025
2024
Introduction to the Minitrack on Innovative Behavioral IS Security and Privacy Research.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024
"We Can't Help You - It's Not Criminal": Revealing Barriers to Reporting Cyberstalking through a Focal Concerns Perspective.
Proceedings of the 30th Americas Conference on Information Systems: Elevating Life through Digital Social Entrepreneurship, 2024
2023
Embracing brain and behaviour: Designing programs of complementary neurophysiological and behavioural studies.
Inf. Syst. J., March, 2023
2022
Common Misunderstandings of Deterrence Theory in Information Systems Research and Future Research Directions.
Data Base, 2022
Proceedings of the 43rd International Conference on Information Systems, 2022
2021
Proceedings of the Advancing Research in Information and Communication Technology, 2021
The Phishing Funnel Model: A Design Artifact to Predict User Susceptibility to Phishing Websites.
Inf. Syst. Res., 2021
2020
The Influence of Professional Subculture on Information Security Policy Violations: A Field Study in a Healthcare Context.
Inf. Syst. Res., 2020
Effects of sanctions, moral beliefs, and neutralization on information security policy violations across cultures.
Inf. Manag., 2020
Can individuals' neutralization techniques be overcome? A field experiment on password policy.
Comput. Secur., 2020
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020
Proceedings of the 41st International Conference on Information Systems, 2020
Introduction to the Minitrack on Innovative Behavioral IS Security and Privacy Research.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020
Proceedings of the 26th Americas Conference on Information Systems, 2020
2019
Proceedings of the Fifteenth Symposium on Usable Privacy and Security, 2019
2018
Tuning Out Security Warnings: A Longitudinal Examination of Habituation Through fMRI, Eye Tracking, and Field Experiments.
MIS Q., 2018
Improving Security Message Adherence through Improved Comprehension: Neural and Behavioral Insights.
Proceedings of the 24th Americas Conference on Information Systems, 2018
2017
What Do We Really Know about How Habituation to Warnings Occurs Over Time?: A Longitudinal fMRI Study of Habituation and Polymorphic Warnings.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017
2016
From Warning to Wallpaper: Why the Brain Habituates to Security Warnings and What Can Be Done About It.
J. Manag. Inf. Syst., 2016
Inf. Syst. Res., 2016
How users perceive and respond to security messages: a NeuroIS research agenda and empirical study.
Eur. J. Inf. Syst., 2016
Your memory is working against you: How eye tracking and memory explain habituation to security warnings.
Decis. Support Syst., 2016
Proceedings of the 24th European Conference on Information Systems, 2016
Proceedings of the 22nd Americas Conference on Information Systems, 2016
2015
Increasing Accountability Through User-Interface Design Artifacts: A New Approach to Addressing the Problem of Access-Policy Violations.
MIS Q., 2015
Neural correlates of gender differences and color in distinguishing security warnings and legitimate websites: a neurosecurity study.
J. Cybersecur., 2015
Proceedings of the 13th Annual International Conference on Mobile Systems, 2015
How Polymorphic Warnings Reduce Habituation in the Brain: Insights from an fMRI Study.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015
The Impact of Technostress on Users' Responses to Security Warnings: A NeuroIS Study.
Proceedings of the 21st Americas Conference on Information Systems, 2015
2014
Using Measures of Risk Perception to Predict Information Security Behavior: Insights from Electroencephalography (EEG).
J. Assoc. Inf. Syst., 2014
Guidelines for improving the contextual relevance of field surveys: the case of information security policy violations.
Eur. J. Inf. Syst., 2014
Users Aren't (Necessarily) Lazy: Using NeuroIS to Explain Habituation to Security Warnings.
Proceedings of the International Conference on Information Systems, 2014
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014
2013
J. Manag. Inf. Syst., 2013
J. Manag. Inf. Syst., 2013
Enhancing Password Security through Interactive Fear Appeals: A Web-Based Field Experiment.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013
2012
J. Organ. End User Comput., 2012
Measuring Electronic Commerce Technology-Enabled Business Value: An Empirical Investigation.
J. Organ. Comput. Electron. Commer., 2012
Using an elaboration likelihood approach to better understand the persuasiveness of website privacy assurance cues for online consumers.
J. Assoc. Inf. Sci. Technol., 2012
Motivating IS security compliance: Insights from Habit and Protection Motivation Theory.
Inf. Manag., 2012
New insights into the problem of software piracy: The effects of neutralization, shame, and moral beliefs.
Inf. Manag., 2012
Reducing Unauthorized Access by Insiders through User Interface Design: Making End Users Accountable.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012
2011
Commun. Assoc. Inf. Syst., 2011
2010
Neutralization: New Insights into the Problem of Employee Systems Security Policy Violations.
MIS Q., 2010
Testing the Potential of RFID to Increase Supply-Chain Agility and to Mitigate the Bullwhip Effect.
Int. J. Appl. Logist., 2010
New Insights for an Old Problem: Explaining Software Piracy through Neutralization Theory.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010
2009
What levels of moral reasoning and values explain adherence to information security rules? An empirical study.
Eur. J. Inf. Syst., 2009
2008
Examining Trust in Information Technology Artifacts: The Effects of System Quality and Culture.
J. Manag. Inf. Syst., 2008
Explaining and Predicting the Impact of Branding Alliances and Web Site Quality on Initial Consumer Trust of E-Commerce Web Sites.
J. Manag. Inf. Syst., 2008
2007
Effectively Complying with Sarbanes-Oxley in Dynamic Business Environments: A Knowledge Traceability Approach.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007
2006
Proceedings of the Connecting the Americas. 12th Americas Conference on Information Systems, 2006
2005
An Empirical Investigation of the Potential of RFID Technology to Enhance Supply Chain Agility.
Proceedings of the Business Agility and Information Technology Diffusion, 2005