Proposing the online community self-disclosure model: the case of working professionals in France and the UK who use online communities C Posey, PB Lowry, TL Roberts, TS Ellis European journal of information systems 19 (2), 181-195, 2010 | 595 | 2010 |
The impact of organizational commitment on insiders’ motivation to protect organizational information assets C Posey, TL Roberts, PB Lowry Journal of Management Information Systems 32 (4), 179-214, 2015 | 444 | 2015 |
Insiders' protection of organizational information assets: Development of a systematics-based taxonomy and theory of diversity for protection-motivated behaviors C Posey, TL Roberts, PB Lowry, RJ Bennett, JF Courtney Mis Quarterly, 1189-1210, 2013 | 286 | 2013 |
Bridging the divide: A qualitative comparison of information security thought patterns between information security professionals and ordinary organizational insiders C Posey, TL Roberts, PB Lowry, RT Hightower Information & management 51 (5), 551-567, 2014 | 258 | 2014 |
Leveraging fairness and reactance theories to deter reactive computer abuse following enhanced organisational information security policies: An empirical study of the influence … PB Lowry, C Posey, RBJ Bennett, TL Roberts Information Systems Journal 25 (3), 193-273, 2015 | 244 | 2015 |
Examining the relationship of organizational insiders' psychological capital with information security threat and coping appraisals AJ Burns, C Posey, TL Roberts, PB Lowry Computers in Human Behavior 68, 190-209, 2017 | 208 | 2017 |
Computer self‐efficacy and motivation to learn in a self‐directed online course MJ Simmering, C Posey, G Piccoli Decision Sciences Journal of Innovative Education 7 (1), 99-121, 2009 | 179 | 2009 |
When computer monitoring backfires: Invasion of privacy and organizational injustice as precursors to computer abuse C Posey, B Bennett, T Roberts, PB Lowry Journal of Information System Security 7 (1), 24-47, 2011 | 177 | 2011 |
Understanding the mindset of the abusive insider: An examination of insiders’ causal reasoning following internal security changes C Posey, RJ Bennett, TL Roberts Computers & Security 30 (6-7), 486-497, 2011 | 149 | 2011 |
The adaptive roles of positive and negative emotions in organizational insiders’ security-based precaution taking AJ Burns, TL Roberts, C Posey, PB Lowry Information Systems Research 30 (4), 1228-1247, 2019 | 79 | 2019 |
Intentions to comply versus intentions to protect: A VIE theory approach to understanding the influence of insiders’ awareness of organizational SETA efforts AJ Burns, TL Roberts, C Posey, RJ Bennett, JF Courtney Decision Sciences 49 (6), 1187-1228, 2018 | 70 | 2018 |
Is your banker leaking your personal information? The roles of ethics and individual-level cultural characteristics in predicting organizational computer abuse PB Lowry, C Posey, TL Roberts, RJ Bennett Journal of Business Ethics 121, 385-401, 2014 | 69 | 2014 |
Organizational science and cybersecurity: abundant opportunities for research at the interface RS Dalal, DJ Howard, RJ Bennett, C Posey, SJ Zaccaro, BJ Brummel Journal of business and psychology 37 (1), 1-29, 2022 | 65 | 2022 |
Organizational information security as a complex adaptive system: insights from three agent-based models AJ Burns, C Posey, JF Courtney, TL Roberts, P Nanayakkara Information Systems Frontiers 19, 509-524, 2017 | 51 | 2017 |
Taking stock of organisations’ protection of privacy: Categorising and assessing threats to personally identifiable information in the USA C Posey, U Raja, RE Crossler, AJ Burns European Journal of Information Systems 26, 585-604, 2017 | 48 | 2017 |
Robbing Peter to pay Paul: Surrendering privacy for security’s sake in an identity ecosystem R Crossler, C Posey Journal of the Association for Information Systems 18 (7), 2, 2017 | 46 | 2017 |
Multiple indicators and multiple causes (MIMIC) models as a mixed-modelling technique: A tutorial and an annotated example C Posey, T Roberts, PB Lowry, B Bennett Communications of the Association for Information Systems 36 (11), 2014 | 43 | 2014 |
Assessing the role of security education, training, and awareness on insiders' security-related behavior: An expectancy theory approach AJ Burns, TL Roberts, C Posey, RJ Bennett, JF Courtney 2015 48th Hawaii International Conference on System Sciences, 3930-3940, 2015 | 40 | 2015 |
Motivating the insider to protect organizational information assets: Evidence from protection motivation theory and rival explanations C Posey, T Roberts, PB Lowry, J Courtney, B Bennett The Dewald Roode workshop in information systems security, 22-23, 2011 | 39 | 2011 |
Job Applicants' Information Privacy Protection Responses: Using Socia Media for Candidate Screening JR Drake, D Hall, JB Becton, C Posey Transactions on Human-Computer Interaction 8 (4), 160, 2016 | 31 | 2016 |