Allen C. Johnston

According to our database1, Allen C. Johnston authored at least 42 papers between 2004 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Security in the Software Development Process: Role of Human Factors.
Proceedings of the 26th Americas Conference on Information Systems, 2020

2019
It Takes a Village: Understanding the Collective Security Efficacy of Employee Groups.
J. Assoc. Inf. Syst., 2019

Speak their Language: Designing Effective Messages to Improve Employees' Information Security Decision Making.
Decis. Sci., 2019

Integrating Construal-level Theory in Designing Fear Appeals in IS Security Research.
Commun. Assoc. Inf. Syst., 2019

How Much is Too Much: Employee Monitoring, Surveillance, and Strain.
Proceedings of the 40th International Conference on Information Systems, 2019

2018
Examining employee computer abuse intentions: insights from justice, deterrence and neutralization perspectives.
Inf. Syst. J., 2018

What could possibly go wrong? A multi-panel Delphi study of organizational social media risk.
Inf. Syst. Frontiers, 2018

Providing Theoretical Foundations: Developing an Integrated Set of Guidelines for Theory Adaptation.
Commun. Assoc. Inf. Syst., 2018

An Examination of Risk Perceptions and Protected Health Information Disclosure Intentions: A Construal Level Theory Perspective.
Proceedings of the 24th Americas Conference on Information Systems, 2018

2017
Introduction to Innovative Behavioral IS Security and Privacy Research Minitrack.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

2016
Neural Correlates of Protection Motivation for Secure IT Behaviors: An fMRI Examination.
J. Assoc. Inf. Syst., 2016

Dispositional and situational factors: influences on information security policy violations.
Eur. J. Inf. Syst., 2016

Continuance of protective security behavior: A longitudinal study.
Decis. Support Syst., 2016

A Broader View of Perceived Risk during Internet Transactions.
Commun. Assoc. Inf. Syst., 2016

Introduction to the Minitrack on Innovative Behavioral IS Security and Privacy Research.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016

2015
An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to the Human Asset Through Sanctioning Rhetoric.
MIS Q., 2015

Undergraduate student perceptions of personal social media risk.
Proceedings of the 2015 Information Security Curriculum Development Conference, 2015

2013
Engaging Remote Employees: The Moderating Role of "Remote" Status in Determining Employee Information Security Policy Awareness.
J. Organ. End User Comput., 2013

Online health communities: An assessment of the influence of participation on patient empowerment outcomes.
Inf. Technol. People, 2013

Social network analysis in accounting information systems research.
Int. J. Account. Inf. Syst., 2013

Future directions for behavioral information security research.
Comput. Secur., 2013

2012
The Role of Individual Characteristics on Insider Abuse Intentions.
Proceedings of the 18th Americas Conference on Information Systems, 2012

2011
The influence of the informal social learning environment on information privacy policy compliance efficacy and intention.
Eur. J. Inf. Syst., 2011

The Role of Perceptions of Organizational Injustice and Techniques of Neutralization in Forming Computer Abuse Intentions.
Proceedings of the A Renaissance of Information Technology for Sustainability and Global Competitiveness. 17th Americas Conference on Information Systems, 2011

2010
Fear Appeals and Information Security Behaviors: An Empirical Study.
MIS Q., 2010

The Influence of Perceived Source Credibility on End User Attitudes and Intentions to Comply with Recommended IT Actions.
J. Organ. End User Comput., 2010

Impact of Negative Message Framing on Security Adoption.
J. Comput. Inf. Syst., 2010

Reigning in the Remote Employee: Applying Social Learning Theory to Explain Information Security Policy Compliance Attitudes.
Proceedings of the Sustainable IT Collaboration Around the Globe. 16th Americas Conference on Information Systems, 2010

2009
An Empirical Assessment of Technology Adoption as a Choice between Alternatives.
Inf. Resour. Manag. J., 2009

Analysis of systems development project risks: an integrative framework.
Data Base, 2009

Improved security through information security governance.
Commun. ACM, 2009

The Impact of National Culture on Workplace Privacy Expectations in the Context of Information Security Assurance.
Proceedings of the 15th Americas Conference on Information Systems, 2009

2008
A Cross-Cultural Comparison of U.S. and Chinese Computer Security Awareness.
J. Glob. Inf. Manag., 2008

Information security management objectives and practices: a parsimonious framework.
Inf. Manag. Comput. Secur., 2008

Information privacy compliance in the healthcare industry.
Inf. Manag. Comput. Secur., 2008

2007
Mitigation of Identity Theft in the Information Age.
Proceedings of the Encyclopedia of Information Ethics and Security, 2007

Rootkits and What we Know: Assessing US and Korean Knowledge and Perceptions.
Int. J. Inf. Secur. Priv., 2007

The IT Security Adoption Conundrum: An Initial Step Toward Validation of Applicable Measures.
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007

Risk Perspectives in Systems Development.
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007

2006
User Interaction with Healthcare Information Systems: Do Healthcare Professionals Want to Comply with HIPAA?
Proceedings of the Connecting the Americas. 12th Americas Conference on Information Systems, 2006

Personality and IT security: An application of the five-factor model.
Proceedings of the Connecting the Americas. 12th Americas Conference on Information Systems, 2006

2004
Wireless Network Security in Hospitality SMEs.
Proceedings of the 10th Americas Conference on Information Systems, 2004


  Loading...