John D'Arcy

Orcid: 0000-0002-0734-7838

According to our database1, John D'Arcy authored at least 47 papers between 2004 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
'What a waste of time': An examination of cybersecurity legitimacy.
Inf. Syst. J., November, 2023

Barking Up the Wrong Tree? Reconsidering Policy Compliance as a Dependent Variable within Behavioral Cybersecurity Research.
Proceedings of the 56th Hawaii International Conference on System Sciences, 2023

A DevOps Perspective: the Impact of Role Transitions on Software Security Continuity.
Proceedings of the 31st European Conference on Information Systems, 2023

2022
The Influences of Public and Institutional Pressure on Firms' Cybersecurity Disclosures.
J. Assoc. Inf. Syst., 2022

Theorizing the Behavioral Effects of Control Complementarity in Security Control Portfolios.
Inf. Syst. Frontiers, 2022

2021
Cybersecurity Awareness and Skills of Senior Citizens: A Motivation Perspective.
J. Comput. Inf. Syst., 2021

When enough is enough: Investigating the antecedents and consequences of information security fatigue.
Inf. Syst. J., 2021

GIVME: Guided Interactions in Virtual Musical Environments: .
Proceedings of the 21th International Conference on New Interfaces for Musical Expression, 2021

2020
Maximizing Employee Compliance with Cybersecurity Policies.
MIS Q. Executive, 2020

Too Good to Be True: Firm Social Performance and the Risk of Data Breach.
Inf. Syst. Res., 2020

Organizational Adoption of Information Security Solutions: An Integrative Lens Based on Innovation Adoption and the Technology- Organization- Environment Framework.
Data Base, 2020

2019
Seeing the Forest and the Trees: A Meta-Analysis of the Antecedents to Information Security Policy Compliance.
MIS Q., 2019

Cognitive-affective drivers of employees' daily compliance with information security policies: A multilevel, longitudinal study.
Inf. Syst. J., 2019

Panel report: the dark side of the digitization of the individual.
Internet Res., 2019

Predicting employee information security policy compliance on a daily basis: The interplay of security-related stress, emotions, and neutralization.
Inf. Manag., 2019

2018
Examining employee security violations: moral disengagement and its environmental influences.
Inf. Technol. People, 2018

Employee Moral Disengagement in Response to Stressful Information Security Requirements: A Methodological Replication of a Coping-Based Model.
AIS Trans. Replication Res., 2018

2017
When Do IT Security Investments Matter? Accounting for the Influence of Institutional Factors in the Context of Healthcare Data Breaches.
MIS Q., 2017

Organizational information security policies: a review and research framework.
Eur. J. Inf. Syst., 2017

Managing Security in Organizations: Adoption of Information Security Solutions.
Proceedings of the 2017 ACM SIGMIS Conference on Computers and People Research, 2017

Capabilities and Skill Configurations of Information Security Incident Responders.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

Seeing the forest and the trees: A meta-analysis of information security policy compliance literature.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

2016
"Cargo Cult" science in traditional organization and information systems survey research: A case for using nontraditional methods of data collection, including Mechanical Turk and online panels.
J. Strateg. Inf. Syst., 2016

Teaching Information Security in Business Schools: Current Practices and a Proposed Direction for the Future.
Commun. Assoc. Inf. Syst., 2016

2015
What Drives Information Security Policy Violations among Banking Employees?: Insights from Neutralization and Social Exchange Theory.
J. Glob. Inf. Manag., 2015

Social Networking Behaviors: Role of personality, perceived risk, and social influences.
Proceedings of the CONF-IRM 2015, 2015

2014
Understanding Employee Responses to Stressful Information Security Requirements: A Coping Perspective.
J. Manag. Inf. Syst., 2014

Security culture and the employment relationship as drivers of employees' security compliance.
Inf. Manag. Comput. Secur., 2014

An exploratory investigation of message-person congruence in information security awareness campaigns.
Comput. Secur., 2014

Reflecting on the "Dark Side" of Information Technology Use.
Commun. Assoc. Inf. Syst., 2014

'Breaching' Auditor Judgments of Information Security Effectiveness.
Proceedings of the International Conference on Information Systems, 2014

2013
Modifying smartphone user locking behavior.
Proceedings of the Symposium On Usable Privacy and Security, 2013

2012
Dual Role of IT-Assisted Communication in Patient Care: A Validated Structure-Process-Outcome Framework.
J. Manag. Inf. Syst., 2012

Applying an extended model of deterrence across cultures: An investigation of information systems misuse in the U.S. and South Korea.
Inf. Manag., 2012

Does Security Impact E-procurement Performance? Testing a Model of Direct and Moderated Effects.
Decis. Sci., 2012

Employee Misuse of Information Technology Resources: Testing a Contemporary Deterrence Model.
Decis. Sci., 2012

The Digital Future: reflecting on the "Dark Side" of Information Technology Use.
Proceedings of the 18th Americas Conference on Information Systems, 2012

2011
A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings.
Eur. J. Inf. Syst., 2011

2009
User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach.
Inf. Syst. Res., 2009

2007
Managing E-Mail Overload: Solutions and Future Challenges.
Computer, 2007

Deterring internal information systems misuse.
Commun. ACM, 2007

Developing usable CAPTCHAs for blind users.
Proceedings of the 9th International ACM SIGACCESS Conference on Computers and Accessibility, 2007

A Personal Information Auction: Measuring the Differential Value of Privacy.
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007

2006
A multi-attribute, multi-weight clustering approach to managing "e-mail overload".
Decis. Support Syst., 2006

2005
Capital market reaction to defective IT products: The case of computer viruses.
Comput. Secur., 2005

2004
The Impact of Virus Attack Announcements on the Market Value of Firms.
Inf. Secur. J. A Glob. Perspect., 2004

The Role of Individual Characteristics on the Effectiveness of IS Security Countermeasures.
Proceedings of the 10th Americas Conference on Information Systems, 2004


  Loading...