Search Results - "D'Arcy, John"
-
1
Applying an extended model of deterrence across cultures: An investigation of information systems misuse in the U.S. and South Korea
Published in Information & management (01-03-2012)“…Intentional employee misuse of IS is a global problem. Research suggests that security countermeasures can deter misuse by increasing the perceived certainty…”
Get full text
Journal Article -
2
Predicting employee information security policy compliance on a daily basis: The interplay of security-related stress, emotions, and neutralization
Published in Information & management (01-11-2019)“…We conceptualized security-related stress (SRS) and proposed a theoretical model linking SRS, discrete emotions, coping response, and information security…”
Get full text
Journal Article -
3
Employee Misuse of Information Technology Resources: Testing a Contemporary Deterrence Model
Published in Decision sciences (01-12-2012)“…ABSTRACT Recent research in information systems and operations management has considered the positive impacts of information technology (IT). However, an…”
Get full text
Journal Article -
4
Understanding Employee Responses to Stressful Information Security Requirements: A Coping Perspective
Published in Journal of management information systems (01-10-2014)“…We use coping theory to explore an underlying relationship between employee stress caused by burdensome, complex, and ambiguous information security…”
Get full text
Journal Article -
5
“Cargo Cult” science in traditional organization and information systems survey research: A case for using nontraditional methods of data collection, including Mechanical Turk and online panels
Published in The journal of strategic information systems (01-10-2016)“…Traditional organization and information systems (IS) researchers have stridently resisted data collections using online data panels, such as Amazon’s…”
Get full text
Journal Article -
6
When Do IT Security Investments Matter? Accounting for the Influence of Institutional Factors in the Context of Healthcare Data Breaches
Published in MIS quarterly (01-09-2017)“…In this study, we argue that institutional factors determine the extent to which hospitals are symbolic or substantive adopters of information technology (IT)…”
Get full text
Journal Article -
7
The Dark Side of Information Technology
Published in MIT Sloan management review (01-12-2015)“…IT misuse behaviors. Interview/qualitative data were analyzed using qualitative content analysis. Multivariate statistical techniques to analyze the…”
Get full text
Journal Article -
8
Reflecting on the “Dark Side” of Information Technology Use
Published in Communications of the Association for Information Systems (2014)“…The authors of this article participated in a panel session at the Americas Conference on Information Systems (AMCIS) 2012 with the objective to advance…”
Get full text
Journal Article -
9
Does One Size Fit All? Examining the Differential Effects of Is Security Countermeasures
Published in Journal of business ethics (01-05-2009)“…Research from the fields of criminology and social psychology suggests that the deterrent effect of security countermeasures is not uniform across individuals…”
Get full text
Journal Article -
10
When enough is enough: Investigating the antecedents and consequences of information security fatigue
Published in Information systems journal (Oxford, England) (01-07-2021)“…Despite concerns raised by practitioners, the potential downside of the information security demands imposed by organizations on their employees has received…”
Get full text
Journal Article -
11
Theorizing the Behavioral Effects of Control Complementarity in Security Control Portfolios
Published in Information systems frontiers (01-04-2022)“…Employees are a major cause of information security vulnerabilities and breaches. Organizations implement controls, such as information security policies, fear…”
Get full text
Journal Article -
12
Testicular torsion and the acute scrotum: current emergency management
Published in European journal of emergency medicine (01-06-2016)“…The acute scrotum is a challenging condition for the treating emergency physician requiring consideration of a number of possible diagnoses including…”
Get full text
Journal Article -
13
‘Sorry doctor….I didn’t hear that….’: phenomenological analysis of medical students’ experiences of simulated hearing impairment through virtual reality
Published in BMJ simulation & technology enhanced learning (01-06-2021)“…IntroductionHearing impairment is a common condition that can have a significant impact on an individual. Ineffective communication between such individuals…”
Get full text
Journal Article -
14
Maximizing Employee Compliance with Cybersecurity Policies
Published in MIS quarterly executive (2020)Get full text
Journal Article -
15
Examining employee security violations: moral disengagement and its environmental influences
Published in Information technology & people (West Linn, Or.) (04-10-2018)“…Purpose Employee security behaviors are the cornerstone for achieving holistic organizational information security. Recent studies in the information systems…”
Get full text
Journal Article -
16
Are Routine Laboratory Investigations Necessary Following Percutaneous Nephrolithotomy?
Published in Urology (Ridgewood, N.J.) (01-09-2020)“…To determine how effective routine postoperative blood work is in identifying complications after percutaneous nephrolithotomy (PCNL), the gold standard…”
Get full text
Journal Article -
17
Stress in the cybersecurity profession: a systematic review of related literature and opportunities for future research
Published in Organizational Cybersecurity Journal: Practice, Process and People (11-12-2023)“…PurposeThe impact of stress on personal and work-related outcomes has been studied in the information systems (IS) literature across several professions…”
Get full text
Journal Article -
18
From Comparative to Interreligious Theology: Perry Schmidt‐Leukel's “Fractal” Version of Pluralism
Published in Journal of religious history (01-09-2020)“…Perry Schmidt‐Leukel has proposed a “fractal” theory to correlate factors which are replicated across religious traditions. His aim is to develop notions of…”
Get full text
Journal Article -
19
Teaching Information Security in Business Schools: Current Practices and a Proposed Direction for the Future
Published in Communications of the Association for Information Systems (2016)“…The growing importance of information security as a business issue has encouraged instructors to extend their courses beyond a hands-on, technical model to one…”
Get full text
Journal Article -
20
Cognitive‐affective drivers of employees' daily compliance with information security policies: A multilevel, longitudinal study
Published in Information systems journal (Oxford, England) (01-01-2019)“…We present a model of employee compliance with information security policy (ISP) that (1) explicates stable, cognitive beliefs regarding the consequences of…”
Get full text
Journal Article