According to our database1, Clay Posey authored at least 23 papers between 2007 and 2021.
Legend:Book In proceedings Article PhD thesis Other
The impact of anonymous, two-way, computer-mediated communication on perceived whistleblower credibility.
Inf. Technol. People, 2021
Insiders' Adaptations to Security-Based Demands in the Workplace: An Examination of Security Behavioral Complexity.
Inf. Syst. Frontiers, 2021
An exploratory examination of organizational insiders' descriptive and normative perceptions of cyber-relevant rights and responsibilities.
Comput. Secur., 2020
Proceedings of the Augmented Cognition. Human Cognition and Behavior, 2020
The Adaptive Roles of Positive and Negative Emotions in Organizational Insiders' Security-Based Precaution Taking.
Inf. Syst. Res., 2019
Intentions to Comply Versus Intentions to Protect: A VIE Theory Approach to Understanding the Influence of Insiders' Awareness of Organizational SETA Efforts.
Decis. Sci., 2018
Robbing Peter to Pay Paul: Surrendering Privacy for Security's Sake in an Identity Ecosystem.
J. Assoc. Inf. Syst., 2017
Organizational information security as a complex adaptive system: insights from three agent-based models.
Inf. Syst. Frontiers, 2017
Taking stock of organisations' protection of privacy: categorising and assessing threats to personally identifiable information in the USA.
Eur. J. Inf. Syst., 2017
Examining the relationship of organizational insiders' psychological capital with information security threat and coping appraisals.
Comput. Hum. Behav., 2017
Job Applicants' Information Privacy Protection Responses: Using Social Media for Candidate Screening.
AIS Trans. Hum. Comput. Interact., 2016
The Impact of Organizational Commitment on Insiders' Motivation to Protect Organizational Information Assets.
J. Manag. Inf. Syst., 2015
Leveraging fairness and reactance theories to deter reactive computer abuse following enhanced organisational information security policies: an empirical study of the influence of counterfactual reasoning and organisational trust.
Inf. Syst. J., 2015
Multiple Indicators and Multiple Causes (MIMIC) Models as a Mixed-Modeling Technique: A Tutorial and an Annotated Example.
Commun. Assoc. Inf. Syst., 2015
Assessing the Role of Security Education, Training, and Awareness on Insiders' Security-Related Behavior: An Expectancy Theory Approach.
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015
Bridging the divide: A qualitative comparison of information security thought patterns between information security professionals and ordinary organizational insiders.
Inf. Manag., 2014
Insiders' Protection of Organizational Information Assets: Development of a Systematics-Based Taxonomy and Theory of Diversity for Protection-Motivated Behaviors.
MIS Q., 2013
The analysis of formative measurement in IS research: choosing between component-and covariance-based techniques.
Data Base, 2013
Understanding the mindset of the abusive insider: An examination of insiders' causal reasoning following internal security changes.
Comput. Secur., 2011
Proposing the online community self-disclosure model: the case of working professionals in France and the U.K. who use online communities.
Eur. J. Inf. Syst., 2010
Information Sharing and Supply Chain Performance: Understanding Complexity, Compatibility, and Processing.
Int. J. Inf. Syst. Supply Chain Manag., 2009
A Meta-Analytic Review of More than a Decade of Research on General Computer Self-Efficacy: Research in Progress.
Proceedings of the Learning from the past & charting the future of the discipline. 14th Americas Conference on Information Systems, 2008
Understanding Self-Disclosure in Electronic Communities: An Exploratory Model of Privacy Risk Beliefs, Reciprocity, and Trust.
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007