Clay Posey

According to our database1, Clay Posey authored at least 23 papers between 2007 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.



In proceedings 
PhD thesis 




The impact of anonymous, two-way, computer-mediated communication on perceived whistleblower credibility.
Inf. Technol. People, 2021

Insiders' Adaptations to Security-Based Demands in the Workplace: An Examination of Security Behavioral Complexity.
Inf. Syst. Frontiers, 2021

An exploratory examination of organizational insiders' descriptive and normative perceptions of cyber-relevant rights and responsibilities.
Comput. Secur., 2020

Confronting Information Security's Elephant, the Unintentional Insider Threat.
Proceedings of the Augmented Cognition. Human Cognition and Behavior, 2020

The Adaptive Roles of Positive and Negative Emotions in Organizational Insiders' Security-Based Precaution Taking.
Inf. Syst. Res., 2019

Intentions to Comply Versus Intentions to Protect: A VIE Theory Approach to Understanding the Influence of Insiders' Awareness of Organizational SETA Efforts.
Decis. Sci., 2018

Robbing Peter to Pay Paul: Surrendering Privacy for Security's Sake in an Identity Ecosystem.
J. Assoc. Inf. Syst., 2017

Organizational information security as a complex adaptive system: insights from three agent-based models.
Inf. Syst. Frontiers, 2017

Taking stock of organisations' protection of privacy: categorising and assessing threats to personally identifiable information in the USA.
Eur. J. Inf. Syst., 2017

Examining the relationship of organizational insiders' psychological capital with information security threat and coping appraisals.
Comput. Hum. Behav., 2017

Job Applicants' Information Privacy Protection Responses: Using Social Media for Candidate Screening.
AIS Trans. Hum. Comput. Interact., 2016

The Impact of Organizational Commitment on Insiders' Motivation to Protect Organizational Information Assets.
J. Manag. Inf. Syst., 2015

Leveraging fairness and reactance theories to deter reactive computer abuse following enhanced organisational information security policies: an empirical study of the influence of counterfactual reasoning and organisational trust.
Inf. Syst. J., 2015

Multiple Indicators and Multiple Causes (MIMIC) Models as a Mixed-Modeling Technique: A Tutorial and an Annotated Example.
Commun. Assoc. Inf. Syst., 2015

Assessing the Role of Security Education, Training, and Awareness on Insiders' Security-Related Behavior: An Expectancy Theory Approach.
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015

Bridging the divide: A qualitative comparison of information security thought patterns between information security professionals and ordinary organizational insiders.
Inf. Manag., 2014

Insiders' Protection of Organizational Information Assets: Development of a Systematics-Based Taxonomy and Theory of Diversity for Protection-Motivated Behaviors.
MIS Q., 2013

The analysis of formative measurement in IS research: choosing between component-and covariance-based techniques.
Data Base, 2013

Understanding the mindset of the abusive insider: An examination of insiders' causal reasoning following internal security changes.
Comput. Secur., 2011

Proposing the online community self-disclosure model: the case of working professionals in France and the U.K. who use online communities.
Eur. J. Inf. Syst., 2010

Information Sharing and Supply Chain Performance: Understanding Complexity, Compatibility, and Processing.
Int. J. Inf. Syst. Supply Chain Manag., 2009

A Meta-Analytic Review of More than a Decade of Research on General Computer Self-Efficacy: Research in Progress.
Proceedings of the Learning from the past & charting the future of the discipline. 14th Americas Conference on Information Systems, 2008

Understanding Self-Disclosure in Electronic Communities: An Exploratory Model of Privacy Risk Beliefs, Reciprocity, and Trust.
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007