• Publications
  • Influence
Proposing the online community self-disclosure model: the case of working professionals in France and the U.K. who use online communities
TLDR
The global use of online communities has exploded to involve hundreds of millions of users. Expand
  • 318
  • 22
  • PDF
The Impact of Organizational Commitment on Insiders’ Motivation to Protect Organizational Information Assets
TLDR
We extend protection motivation theory by assessing maladaptive rewards, response costs, and fear alongside traditional PMT components. Expand
  • 121
  • 13
Insiders' Protection of Organizational Information Assets: Development of a Systematics-Based Taxonomy and Theory of Diversity for Protection-Motivated Behaviors
TLDR
This research focuses on protection-motivated behaviors (PMBs), which are volitional behaviors enacted by organization insiders to protect (1) organizationally relevant information and (2) the computer-based information systems in which the information is stored, collected, disseminated, and/or manipulated from information security threats. Expand
  • 138
  • 12
  • PDF
Bridging the divide: A qualitative comparison of information security thought patterns between information security professionals and ordinary organizational insiders
TLDR
This study provides insight into how insiders gauge the efficacy of recommended responses to information security threats and compares it against the mindset of information security professionals. Expand
  • 104
  • 11
Understanding the mindset of the abusive insider: An examination of insiders' causal reasoning following internal security changes
TLDR
This research attempts to understand this phenomenon of increased internal computer abuses by applying causal reasoning theory to explain employees' causal-search process following the implementation of information security measures. Expand
  • 78
  • 6
Leveraging fairness and reactance theories to deter reactive computer abuse following enhanced organisational information security policies: an empirical study of the influence of counterfactual
TLDR
We use fairness theory (FT) and reactance theory (RT) to explain why employees may blame organisations for and retaliate against enhanced information security policies (ISPs). Expand
  • 103
  • 5
Computer Self-Efficacy and Motivation to Learn in a Self-Directed Online Course
Despite the increased use of new learning technologies, there is still much to be learned about the role of learner characteristics in online learning. The purpose of this study was to examine howExpand
  • 90
  • 5
Motivating the Insider to Protect Organizational Information Assets: Evidence from Protection Motivation Theory and Rival Explanations
This research investigates the factors that motivate employees to protect their organizations from information security threats via protection-motivated behaviors (PMBs). A model founded onExpand
  • 18
  • 5
When Computer Monitoring Backfires: Invasion of Privacy and Organizational Injustice as Precursors to Computer Abuse
This manuscript examines the unintended consequences that organizational computer monitoring can foster within the firm. We apply justice and reactance theories to explain why monitoring can actuallyExpand
  • 82
  • 4
Examining the Relationship of Organizational Insiders' Psychological Capital with Information Security Threat and Coping Appraisals
TLDR
We extend an oft-cited theory in the information security literatureprotection motivation theory to include the relationship of insiders' psychological capital (PsyCap) with the mechanisms of PMT. Expand
  • 54
  • 3
  • PDF
...
1
2
3
4
...