John D'Arcy
Orcid: 0000-0002-0734-7838
According to our database1,
John D'Arcy
authored at least 48 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2005
2010
2015
2020
0
1
2
3
4
5
6
1
1
2
2
3
4
2
2
2
1
4
4
1
1
2
1
1
1
2
1
3
1
1
1
1
2
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Time Will Tell: The Case for an Idiographic Approach to Behavioral Cybersecurity Research.
MIS Q., 2024
2023
Inf. Syst. J., November, 2023
Barking Up the Wrong Tree? Reconsidering Policy Compliance as a Dependent Variable within Behavioral Cybersecurity Research.
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023
A DevOps Perspective: the Impact of Role Transitions on Software Security Continuity.
Proceedings of the 31st European Conference on Information Systems, 2023
2022
The Influences of Public and Institutional Pressure on Firms' Cybersecurity Disclosures.
J. Assoc. Inf. Syst., 2022
Theorizing the Behavioral Effects of Control Complementarity in Security Control Portfolios.
Inf. Syst. Frontiers, 2022
2021
J. Comput. Inf. Syst., 2021
When enough is enough: Investigating the antecedents and consequences of information security fatigue.
Inf. Syst. J., 2021
Proceedings of the 21th International Conference on New Interfaces for Musical Expression, 2021
2020
Inf. Syst. Res., 2020
Organizational Adoption of Information Security Solutions: An Integrative Lens Based on Innovation Adoption and the Technology- Organization- Environment Framework.
Data Base, 2020
2019
Seeing the Forest and the Trees: A Meta-Analysis of the Antecedents to Information Security Policy Compliance.
MIS Q., 2019
Cognitive-affective drivers of employees' daily compliance with information security policies: A multilevel, longitudinal study.
Inf. Syst. J., 2019
Internet Res., 2019
Predicting employee information security policy compliance on a daily basis: The interplay of security-related stress, emotions, and neutralization.
Inf. Manag., 2019
2018
Examining employee security violations: moral disengagement and its environmental influences.
Inf. Technol. People, 2018
Employee Moral Disengagement in Response to Stressful Information Security Requirements: A Methodological Replication of a Coping-Based Model.
AIS Trans. Replication Res., 2018
2017
When Do IT Security Investments Matter? Accounting for the Influence of Institutional Factors in the Context of Healthcare Data Breaches.
MIS Q., 2017
Eur. J. Inf. Syst., 2017
Proceedings of the 2017 ACM SIGMIS Conference on Computers and People Research, 2017
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017
Seeing the forest and the trees: A meta-analysis of information security policy compliance literature.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017
2016
"Cargo Cult" science in traditional organization and information systems survey research: A case for using nontraditional methods of data collection, including Mechanical Turk and online panels.
J. Strateg. Inf. Syst., 2016
Teaching Information Security in Business Schools: Current Practices and a Proposed Direction for the Future.
Commun. Assoc. Inf. Syst., 2016
2015
What Drives Information Security Policy Violations among Banking Employees?: Insights from Neutralization and Social Exchange Theory.
J. Glob. Inf. Manag., 2015
Social Networking Behaviors: Role of personality, perceived risk, and social influences.
Proceedings of the CONF-IRM 2015, 2015
2014
Understanding Employee Responses to Stressful Information Security Requirements: A Coping Perspective.
J. Manag. Inf. Syst., 2014
Security culture and the employment relationship as drivers of employees' security compliance.
Inf. Manag. Comput. Secur., 2014
An exploratory investigation of message-person congruence in information security awareness campaigns.
Comput. Secur., 2014
Commun. Assoc. Inf. Syst., 2014
Proceedings of the International Conference on Information Systems, 2014
2013
Proceedings of the Symposium On Usable Privacy and Security, 2013
2012
Dual Role of IT-Assisted Communication in Patient Care: A Validated Structure-Process-Outcome Framework.
J. Manag. Inf. Syst., 2012
Applying an extended model of deterrence across cultures: An investigation of information systems misuse in the U.S. and South Korea.
Inf. Manag., 2012
Does Security Impact E-procurement Performance? Testing a Model of Direct and Moderated Effects.
Decis. Sci., 2012
Employee Misuse of Information Technology Resources: Testing a Contemporary Deterrence Model.
Decis. Sci., 2012
Proceedings of the 18th Americas Conference on Information Systems, 2012
2011
A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings.
Eur. J. Inf. Syst., 2011
2009
User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach.
Inf. Syst. Res., 2009
2007
Proceedings of the 9th International ACM SIGACCESS Conference on Computers and Accessibility, 2007
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007
2006
Decis. Support Syst., 2006
2005
Comput. Secur., 2005
2004
Inf. Secur. J. A Glob. Perspect., 2004
The Role of Individual Characteristics on the Effectiveness of IS Security Countermeasures.
Proceedings of the 10th Americas Conference on Information Systems, 2004