Fear appeals and information security behaviors: an empirical study AC Johnston, M Warkentin MIS Quarterly, 549-566, 2010 | 1768 | 2010 |
Future directions for behavioral information security research RE Crossler, AC Johnston, PB Lowry, Q Hu, M Warkentin, R Baskerville Computers & Security 32, 90-101, 2013 | 1001 | 2013 |
An enhanced fear appeal rhetorical framework: Leveraging threats to the human asset through sanctioning rhetoric AC Johnston, M Warkentin, M Siponen MIS Quarterly 39 (1), 113-134, 2015 | 600 | 2015 |
The influence of the informal social learning environment on information privacy policy compliance efficacy and intention M Warkentin, AC Johnston, J Shropshire European Journal of Information Systems 20 (3), 267-284, 2011 | 333 | 2011 |
Dispositional and situational factors: influences on information security policy violations AC Johnston, M Warkentin, M McBride, L Carter European Journal of Information Systems 25 (3), 231-251, 2016 | 281 | 2016 |
Online health communities: an assessment of the influence of participation on patient empowerment outcomes AC Johnston, JL Worrell, PM Di Gangi, M Wasko Information Technology & People 26 (2), 213-235, 2013 | 241 | 2013 |
Examining employee computer abuse intentions: Insights from justice, deterrence and neutralization perspectives R Willison, M Warkentin, AC Johnston Information Systems Journal 28 (2), 266-293, 2018 | 185 | 2018 |
Continuance of protective security behavior: A longitudinal study M Warkentin, AC Johnston, J Shropshire, WD Barnett Decision Support Systems 92, 25-35, 2016 | 168 | 2016 |
Improved security through information security governance AC Johnston, R Hale Communications of the ACM 52 (1), 126-129, 2009 | 168 | 2009 |
Information security management objectives and practices: a parsimonious framework Q Ma, AC Johnston, JM Pearson Information Management & Computer Security 16 (3), 251-270, 2008 | 144 | 2008 |
Neural correlates of protection motivation for secure IT behaviors: An fMRI examination M Warkentin, E Walden, AC Johnston, DW Straub Journal of the Association for Information Systems 17 (3), 1, 2016 | 143 | 2016 |
Individuals’ privacy concerns and adoption of contact tracing mobile applications in a pandemic: A situational privacy calculus perspective F Hassandoust, S Akhlaghpour, AC Johnston Journal of the American Medical Informatics Association 28 (3), 463-471, 2021 | 133 | 2021 |
Personality and IT security: An application of the five-factor model J Shropshire, M Warkentin, A Johnston, M Schmidt AMCIS 2006 Proceedings, 415, 2006 | 109 | 2006 |
Social network analysis in accounting information systems research J Worrell, M Wasko, A Johnston International Journal of Accounting Information Systems 14 (2), 127-137, 2013 | 97 | 2013 |
Speak their language: Designing effective messages to improve employees’ information security decision making AC Johnston, M Warkentin, AR Dennis, M Siponen Decision Sciences 50 (2), 245-284, 2019 | 88 | 2019 |
The influence of perceived source credibility on end user attitudes and intentions to comply with recommended IT actions AC Johnston, M Warkentin Journal of Organizational and End User Computing (JOEUC) 22 (3), 1-21, 2010 | 72 | 2010 |
Analysis of systems development project risks: An integrative framework M Warkentin, RS Moore, E Bekkering, AC Johnston ACM SIGMIS Database: the DATABASE for Advances in Information Systems 40 (2 …, 2009 | 70 | 2009 |
Information privacy compliance in the healthcare industry AC Johnston, M Warkentin Information Management & Computer Security 16 (1), 5-19, 2008 | 67 | 2008 |
IT governance and organizational design for security management M Warkentin, AC Johnston Information security, 46-68, 2016 | 62 | 2016 |
Running field experiments using Facebook split test DC Orazi, AC Johnston Journal of Business Research 118, 189-198, 2020 | 58 | 2020 |