Anthony Vance

Orcid: 0000-0002-4554-6176

According to our database1, Anthony Vance authored at least 48 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Introduction to the Minitrack on Innovative Behavioral IS Security and Privacy Research.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

2023
Embracing brain and behaviour: Designing programs of complementary neurophysiological and behavioural studies.
Inf. Syst. J., March, 2023

2022
Common Misunderstandings of Deterrence Theory in Information Systems Research and Future Research Directions.
Data Base, 2022

Taking a Seat at the Table: The Quest for CISO Legitimacy.
Proceedings of the 43rd International Conference on Information Systems, 2022

2021
The Phishing Funnel Model: A Design Artifact to Predict User Susceptibility to Phishing Websites.
Inf. Syst. Res., 2021

2020
The Influence of Professional Subculture on Information Security Policy Violations: A Field Study in a Healthcare Context.
Inf. Syst. Res., 2020

Effects of sanctions, moral beliefs, and neutralization on information security policy violations across cultures.
Inf. Manag., 2020

Can individuals' neutralization techniques be overcome? A field experiment on password policy.
Comput. Secur., 2020

An Ordinal Approach to Modeling and Visualizing Phishing Susceptibility.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2020

The Differential Role of Alternative Data in SME-Focused Fintech Lending.
Proceedings of the 41st International Conference on Information Systems, 2020

The Differential Role of Alternative Data in SME-Focused Fintech Lending.
Proceedings of the 26th Americas Conference on Information Systems, 2020

2019
The Fog of Warnings: How Non-essential Notifications Blur with Security Warnings.
Proceedings of the Fifteenth Symposium on Usable Privacy and Security, 2019

2018
Tuning Out Security Warnings: A Longitudinal Examination of Habituation Through fMRI, Eye Tracking, and Field Experiments.
MIS Q., 2018

Improving Security Message Adherence through Improved Comprehension: Neural and Behavioral Insights.
Proceedings of the 24th Americas Conference on Information Systems, 2018

2017
Introduction to Innovative Behavioral IS Security and Privacy Research Minitrack.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

What Do We Really Know about How Habituation to Warnings Occurs Over Time?: A Longitudinal fMRI Study of Habituation and Polymorphic Warnings.
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

2016
From Warning to Wallpaper: Why the Brain Habituates to Security Warnings and What Can Be Done About It.
J. Manag. Inf. Syst., 2016

More Harm Than Good? How Messages That Interrupt Can Make Us Vulnerable.
Inf. Syst. Res., 2016

How users perceive and respond to security messages: a NeuroIS research agenda and empirical study.
Eur. J. Inf. Syst., 2016

Your memory is working against you: How eye tracking and memory explain habituation to security warnings.
Decis. Support Syst., 2016

Introduction to the Minitrack on Innovative Behavioral IS Security and Privacy Research.
Proceedings of the 49th Hawaii International Conference on System Sciences, 2016

When Training Gets Trumped: How dual-Task interference inhibits Security Training.
Proceedings of the 24th European Conference on Information Systems, 2016

Integrating Facial Cues of Threat into Security Warnings - An fMRI and Field Study.
Proceedings of the 22nd Americas Conference on Information Systems, 2016

2015
Increasing Accountability Through User-Interface Design Artifacts: A New Approach to Addressing the Problem of Access-Policy Violations.
MIS Q., 2015

Neural correlates of gender differences and color in distinguishing security warnings and legitimate websites: a neurosecurity study.
J. Cybersecur., 2015

Analyzing the Use of Quick Response Codes in the Wild.
Proceedings of the 13th Annual International Conference on Mobile Systems, 2015

How Polymorphic Warnings Reduce Habituation in the Brain: Insights from an fMRI Study.
Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, 2015

2014
Using Measures of Risk Perception to Predict Information Security Behavior: Insights from Electroencephalography (EEG).
J. Assoc. Inf. Syst., 2014

Guidelines for improving the contextual relevance of field surveys: the case of information security policy violations.
Eur. J. Inf. Syst., 2014

2013
Using Accountability to Reduce Access Policy Violations in Information Systems.
J. Manag. Inf. Syst., 2013

The Drivers in the Use of Online Whistle-Blowing Reporting Systems.
J. Manag. Inf. Syst., 2013

Enhancing Password Security through Interactive Fear Appeals: A Web-Based Field Experiment.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013

2012
MetaFraud: A Meta-Learning Framework for Detecting Financial Fraud.
MIS Q., 2012

IS Security Policy Violations: A Rational Choice Perspective.
J. Organ. End User Comput., 2012

Measuring Electronic Commerce Technology-Enabled Business Value: An Empirical Investigation.
J. Organ. Comput. Electron. Commer., 2012

Using an elaboration likelihood approach to better understand the persuasiveness of website privacy assurance cues for online consumers.
J. Assoc. Inf. Sci. Technol., 2012

Motivating IS security compliance: Insights from Habit and Protection Motivation Theory.
Inf. Manag., 2012

New insights into the problem of software piracy: The effects of neutralization, shame, and moral beliefs.
Inf. Manag., 2012

Reducing Unauthorized Access by Insiders through User Interface Design: Making End Users Accountable.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012

2011
Overview and Guidance on Agile Development in Large Organizations.
Commun. Assoc. Inf. Syst., 2011

2010
Neutralization: New Insights into the Problem of Employee Systems Security Policy Violations.
MIS Q., 2010

Testing the Potential of RFID to Increase Supply-Chain Agility and to Mitigate the Bullwhip Effect.
Int. J. Appl. Logist., 2010

New Insights for an Old Problem: Explaining Software Piracy through Neutralization Theory.
Proceedings of the 43rd Hawaii International International Conference on Systems Science (HICSS-43 2010), 2010

2009
What levels of moral reasoning and values explain adherence to information security rules? An empirical study.
Eur. J. Inf. Syst., 2009

2008
Examining Trust in Information Technology Artifacts: The Effects of System Quality and Culture.
J. Manag. Inf. Syst., 2008

Explaining and Predicting the Impact of Branding Alliances and Web Site Quality on Initial Consumer Trust of E-Commerce Web Sites.
J. Manag. Inf. Syst., 2008

2007
Effectively Complying with Sarbanes-Oxley in Dynamic Business Environments: A Knowledge Traceability Approach.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

2005
An Empirical Investigation of the Potential of RFID Technology to Enhance Supply Chain Agility.
Proceedings of the Business Agility and Information Technology Diffusion, 2005


  Loading...