Clay Posey

Orcid: 0000-0001-6704-0750

According to our database1, Clay Posey authored at least 25 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Student Interaction with Generative AI: An Exploration of an Emergent Information-Search Process.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

2023
Going Beyond Deterrence: A Middle-Range Theory of Motives and Controls for Insider Computer Abuse.
Inf. Syst. Res., March, 2023

2021
The impact of anonymous, two-way, computer-mediated communication on perceived whistleblower credibility.
Inf. Technol. People, 2021

Insiders' Adaptations to Security-Based Demands in the Workplace: An Examination of Security Behavioral Complexity.
Inf. Syst. Frontiers, 2021

2020
An exploratory examination of organizational insiders' descriptive and normative perceptions of cyber-relevant rights and responsibilities.
Comput. Secur., 2020

Confronting Information Security's Elephant, the Unintentional Insider Threat.
Proceedings of the Augmented Cognition. Human Cognition and Behavior, 2020

2019
The Adaptive Roles of Positive and Negative Emotions in Organizational Insiders' Security-Based Precaution Taking.
Inf. Syst. Res., 2019

2018
Intentions to Comply Versus Intentions to Protect: A VIE Theory Approach to Understanding the Influence of Insiders' Awareness of Organizational SETA Efforts.
Decis. Sci., 2018

2017
Robbing Peter to Pay Paul: Surrendering Privacy for Security's Sake in an Identity Ecosystem.
J. Assoc. Inf. Syst., 2017

Organizational information security as a complex adaptive system: insights from three agent-based models.
Inf. Syst. Frontiers, 2017

Taking stock of organisations' protection of privacy: categorising and assessing threats to personally identifiable information in the USA.
Eur. J. Inf. Syst., 2017

Examining the relationship of organizational insiders' psychological capital with information security threat and coping appraisals.
Comput. Hum. Behav., 2017

2016
Job Applicants' Information Privacy Protection Responses: Using Social Media for Candidate Screening.
AIS Trans. Hum. Comput. Interact., 2016

2015
The Impact of Organizational Commitment on Insiders' Motivation to Protect Organizational Information Assets.
J. Manag. Inf. Syst., 2015

Leveraging fairness and reactance theories to deter reactive computer abuse following enhanced organisational information security policies: an empirical study of the influence of counterfactual reasoning and organisational trust.
Inf. Syst. J., 2015

Multiple Indicators and Multiple Causes (MIMIC) Models as a Mixed-Modeling Technique: A Tutorial and an Annotated Example.
Commun. Assoc. Inf. Syst., 2015

Assessing the Role of Security Education, Training, and Awareness on Insiders' Security-Related Behavior: An Expectancy Theory Approach.
Proceedings of the 48th Hawaii International Conference on System Sciences, 2015

2014
Bridging the divide: A qualitative comparison of information security thought patterns between information security professionals and ordinary organizational insiders.
Inf. Manag., 2014

2013
Insiders' Protection of Organizational Information Assets: Development of a Systematics-Based Taxonomy and Theory of Diversity for Protection-Motivated Behaviors.
MIS Q., 2013

The analysis of formative measurement in IS research: choosing between component-and covariance-based techniques.
Data Base, 2013

2011
Understanding the mindset of the abusive insider: An examination of insiders' causal reasoning following internal security changes.
Comput. Secur., 2011

2010
Proposing the online community self-disclosure model: the case of working professionals in France and the U.K. who use online communities.
Eur. J. Inf. Syst., 2010

2009
Information Sharing and Supply Chain Performance: Understanding Complexity, Compatibility, and Processing.
Int. J. Inf. Syst. Supply Chain Manag., 2009

2008
A Meta-Analytic Review of More than a Decade of Research on General Computer Self-Efficacy: Research in Progress.
Proceedings of the Learning from the past & charting the future of the discipline. 14th Americas Conference on Information Systems, 2008

2007
Understanding Self-Disclosure in Electronic Communities: An Exploratory Model of Privacy Risk Beliefs, Reciprocity, and Trust.
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007


  Loading...