Clay Posey
Titre
Citée par
Citée par
Année
Proposing the online community self-disclosure model: the case of working professionals in France and the UK who use online communities
C Posey, PB Lowry, TL Roberts, TS Ellis
European journal of information systems 19 (2), 181-195, 2010
4052010
The impact of organizational commitment on insiders’ motivation to protect organizational information assets
C Posey, TL Roberts, PB Lowry
Journal of Management Information Systems 32 (4), 179-214, 2015
1892015
Insiders' protection of organizational information assets: development of a systematics-based taxonomy and theory of diversity for protection-motivated behaviors
C Posey, TL Roberts, PB Lowry, RJ Bennett, JF Courtney
Mis Quarterly, 1189-1210, 2013
1842013
Bridging the divide: A qualitative comparison of information security thought patterns between information security professionals and ordinary organizational insiders
C Posey, TL Roberts, PB Lowry, RT Hightower
Information & management 51 (5), 551-567, 2014
1612014
Leveraging fairness and reactance theories to deter reactive computer abuse following enhanced organisational information security policies: An empirical study of the influence …
PB Lowry, C Posey, RBJ Bennett, TL Roberts
Information Systems Journal 25 (3), 193-273, 2015
1362015
Computer self‐efficacy and motivation to learn in a self‐directed online course
MJ Simmering, C Posey, G Piccoli
Decision Sciences Journal of Innovative Education 7 (1), 99-121, 2009
1242009
When computer monitoring backfires: Invasion of privacy and organizational injustice as precursors to computer abuse
C Posey, B Bennett, T Roberts, PB Lowry
Journal of Information System Security 7 (1), 24-47, 2011
1172011
Understanding the mindset of the abusive insider: An examination of insiders’ causal reasoning following internal security changes
C Posey, RJ Bennett, TL Roberts
Computers & Security 30 (6-7), 486-497, 2011
1062011
Examining the relationship of organizational insiders' psychological capital with information security threat and coping appraisals
AJ Burns, C Posey, TL Roberts, PB Lowry
Computers in Human Behavior 68, 190-209, 2017
812017
Is your banker leaking your personal information? The roles of ethics and individual-level cultural characteristics in predicting organizational computer abuse
PB Lowry, C Posey, TL Roberts, RJ Bennett
Journal of Business Ethics 121 (3), 385-401, 2014
542014
Robbing Peter to pay Paul: Surrendering privacy for security’s sake in an identity ecosystem
R Crossler, C Posey
Journal of the Association for Information Systems 18 (7), 2, 2017
242017
Motivating the insider to protect organizational information assets: Evidence from protection motivation theory and rival explanations
C Posey, T Roberts, PB Lowry, J Courtney, B Bennett
The Dewald Roode workshop in information systems security, 22-23, 2011
222011
Organizational information security as a complex adaptive system: insights from three agent-based models
AJ Burns, C Posey, JF Courtney, TL Roberts, P Nanayakkara
Information Systems Frontiers 19 (3), 509-524, 2017
212017
Multiple indicators and multiple causes (MIMIC) models as a mixed-modelling technique: A tutorial and an annotated example
C Posey, T Roberts, PB Lowry, B Bennett
Communications of the Association for Information Systems 36 (11), 2014
182014
Taking stock of organisations’ protection of privacy: categorising and assessing threats to personally identifiable information in the USA
C Posey, U Raja, RE Crossler, AJ Burns
European Journal of Information Systems 26 (6), 585-604, 2017
172017
Assessing the role of security education, training, and awareness on insiders' security-related behavior: An expectancy theory approach
AJ Burns, TL Roberts, C Posey, RJ Bennett, JF Courtney
2015 48th Hawaii International Conference on System Sciences, 3930-3940, 2015
172015
Information sharing and supply chain performance: Understanding complexity, compatibility, and processing
C Posey, A Bari
International Journal of Information Systems and Supply Chain Management …, 2009
152009
Intentions to comply versus intentions to protect: A VIE theory approach to understanding the influence of insiders’ awareness of organizational SETA efforts
AJ Burns, TL Roberts, C Posey, RJ Bennett, JF Courtney
Decision Sciences 49 (6), 1187-1228, 2018
142018
Job Applicants' Information Privacy Protection Responses: Using Socia Media for Candidate Screening
JR Drake, D Hall, JB Becton, C Posey
Transactions on Human-Computer Interaction 8 (4), 160, 2016
132016
Understanding self-disclosure in electronic communities: an exploratory model of privacy risk beliefs, reciprocity, and trust
C Posey, S Ellis
AMCIS 2007 Proceedings, 9, 2007
122007
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20