Search Results - "D'Arcy, John"

Refine Results
  1. 1

    Applying an extended model of deterrence across cultures: An investigation of information systems misuse in the U.S. and South Korea by Hovav, Anat, D’Arcy, John

    Published in Information & management (01-03-2012)
    “…Intentional employee misuse of IS is a global problem. Research suggests that security countermeasures can deter misuse by increasing the perceived certainty…”
    Get full text
    Journal Article
  2. 2

    Predicting employee information security policy compliance on a daily basis: The interplay of security-related stress, emotions, and neutralization by D’Arcy, John, Teh, Pei-Lee

    Published in Information & management (01-11-2019)
    “…We conceptualized security-related stress (SRS) and proposed a theoretical model linking SRS, discrete emotions, coping response, and information security…”
    Get full text
    Journal Article
  3. 3

    Employee Misuse of Information Technology Resources: Testing a Contemporary Deterrence Model by D'Arcy, John, Devaraj, Sarv

    Published in Decision sciences (01-12-2012)
    “…ABSTRACT Recent research in information systems and operations management has considered the positive impacts of information technology (IT). However, an…”
    Get full text
    Journal Article
  4. 4

    Understanding Employee Responses to Stressful Information Security Requirements: A Coping Perspective by D'Arcy, John, Herath, Tejaswini, Shoss, Mindy K.

    Published in Journal of management information systems (01-10-2014)
    “…We use coping theory to explore an underlying relationship between employee stress caused by burdensome, complex, and ambiguous information security…”
    Get full text
    Journal Article
  5. 5

    “Cargo Cult” science in traditional organization and information systems survey research: A case for using nontraditional methods of data collection, including Mechanical Turk and online panels by Lowry, Paul Benjamin, D’Arcy, John, Hammer, Bryan, Moody, Gregory D.

    “…Traditional organization and information systems (IS) researchers have stridently resisted data collections using online data panels, such as Amazon’s…”
    Get full text
    Journal Article
  6. 6

    When Do IT Security Investments Matter? Accounting for the Influence of Institutional Factors in the Context of Healthcare Data Breaches by Angst, Corey M., Block, Emily S., D’Arcy, John, Kelley, Ken

    Published in MIS quarterly (01-09-2017)
    “…In this study, we argue that institutional factors determine the extent to which hospitals are symbolic or substantive adopters of information technology (IT)…”
    Get full text
    Journal Article
  7. 7

    The Dark Side of Information Technology by Tarafdar, Monideepa, DArcy, John, Turel, Ofir, Gupta, Ashish

    Published in MIT Sloan management review (01-12-2015)
    “…IT misuse behaviors. Interview/qualitative data were analyzed using qualitative content analysis. Multivariate statistical techniques to analyze the…”
    Get full text
    Journal Article
  8. 8

    Reflecting on the “Dark Side” of Information Technology Use by D’Arcy, John, Gupta, Ashish, Tarafdar, Monideepa, Turel, Ofir

    “…The authors of this article participated in a panel session at the Americas Conference on Information Systems (AMCIS) 2012 with the objective to advance…”
    Get full text
    Journal Article
  9. 9

    Does One Size Fit All? Examining the Differential Effects of Is Security Countermeasures by D'Arcy, John, Hovav, Anat

    Published in Journal of business ethics (01-05-2009)
    “…Research from the fields of criminology and social psychology suggests that the deterrent effect of security countermeasures is not uniform across individuals…”
    Get full text
    Journal Article
  10. 10

    When enough is enough: Investigating the antecedents and consequences of information security fatigue by Cram, W. Alec, Proudfoot, Jeffrey G., D'Arcy, John

    “…Despite concerns raised by practitioners, the potential downside of the information security demands imposed by organizations on their employees has received…”
    Get full text
    Journal Article
  11. 11

    Theorizing the Behavioral Effects of Control Complementarity in Security Control Portfolios by Wall, Jeffrey D., Palvia, Prashant, D’Arcy, John

    Published in Information systems frontiers (01-04-2022)
    “…Employees are a major cause of information security vulnerabilities and breaches. Organizations implement controls, such as information security policies, fear…”
    Get full text
    Journal Article
  12. 12

    Testicular torsion and the acute scrotum: current emergency management by Ta, Anthony, D’Arcy, Frank T, Hoag, Nathan, D’Arcy, John P, Lawrentschuk, Nathan

    Published in European journal of emergency medicine (01-06-2016)
    “…The acute scrotum is a challenging condition for the treating emergency physician requiring consideration of a number of possible diagnoses including…”
    Get full text
    Journal Article
  13. 13

    ‘Sorry doctor….I didn’t hear that….’: phenomenological analysis of medical students’ experiences of simulated hearing impairment through virtual reality by McLaughlin, Niamh, Rogers, Janet, D’Arcy, John, Gormley, Gerard

    “…IntroductionHearing impairment is a common condition that can have a significant impact on an individual. Ineffective communication between such individuals…”
    Get full text
    Journal Article
  14. 14
  15. 15

    Examining employee security violations: moral disengagement and its environmental influences by Herath, Tejaswini, Yim, Myung-Seong, D’Arcy, John, Nam, Kichan, Rao, H.R

    “…Purpose Employee security behaviors are the cornerstone for achieving holistic organizational information security. Recent studies in the information systems…”
    Get full text
    Journal Article
  16. 16

    Are Routine Laboratory Investigations Necessary Following Percutaneous Nephrolithotomy? by Reynolds, Luke F., Kroczak, Tadeusz, Pace, Kenneth T., D'Arcy Honey, R. John, Ordon, Michael, Lee, Jason Y.

    Published in Urology (Ridgewood, N.J.) (01-09-2020)
    “…To determine how effective routine postoperative blood work is in identifying complications after percutaneous nephrolithotomy (PCNL), the gold standard…”
    Get full text
    Journal Article
  17. 17

    Stress in the cybersecurity profession: a systematic review of related literature and opportunities for future research by Singh, Tripti, Johnston, Allen C., D'Arcy, John, Harms, Peter D.

    “…PurposeThe impact of stress on personal and work-related outcomes has been studied in the information systems (IS) literature across several professions…”
    Get full text
    Journal Article
  18. 18

    From Comparative to Interreligious Theology: Perry Schmidt‐Leukel's “Fractal” Version of Pluralism by D'Arcy May, John

    Published in Journal of religious history (01-09-2020)
    “…Perry Schmidt‐Leukel has proposed a “fractal” theory to correlate factors which are replicated across religious traditions. His aim is to develop notions of…”
    Get full text
    Journal Article
  19. 19

    Teaching Information Security in Business Schools: Current Practices and a Proposed Direction for the Future by Cram, W. Alec, D'Arcy, John

    “…The growing importance of information security as a business issue has encouraged instructors to extend their courses beyond a hands-on, technical model to one…”
    Get full text
    Journal Article
  20. 20

    Cognitive‐affective drivers of employees' daily compliance with information security policies: A multilevel, longitudinal study by D'Arcy, John, Lowry, Paul Benjamin

    “…We present a model of employee compliance with information security policy (ISP) that (1) explicates stable, cognitive beliefs regarding the consequences of…”
    Get full text
    Journal Article