Clay Posey
Clay Posey
Verified email at - Homepage
Cited by
Cited by
Proposing the online community self-disclosure model: the case of working professionals in France and the UK who use online communities
C Posey, PB Lowry, TL Roberts, TS Ellis
European journal of information systems 19, 181-195, 2010
The impact of organizational commitment on insiders’ motivation to protect organizational information assets
C Posey, TL Roberts, PB Lowry
Journal of Management Information Systems 32 (4), 179-214, 2015
Insiders' protection of organizational information assets: Development of a systematics-based taxonomy and theory of diversity for protection-motivated behaviors
C Posey, TL Roberts, PB Lowry, RJ Bennett, JF Courtney
Mis Quarterly, 1189-1210, 2013
Bridging the divide: A qualitative comparison of information security thought patterns between information security professionals and ordinary organizational insiders
C Posey, TL Roberts, PB Lowry, RT Hightower
Information & management 51 (5), 551-567, 2014
Leveraging fairness and reactance theories to deter reactive computer abuse following enhanced organisational information security policies: An empirical study of the influence …
PB Lowry, C Posey, RBJ Bennett, TL Roberts
Information Systems Journal 25 (3), 193-273, 2015
Examining the relationship of organizational insiders' psychological capital with information security threat and coping appraisals
AJ Burns, C Posey, TL Roberts, PB Lowry
Computers in Human Behavior 68, 190-209, 2017
Computer self‐efficacy and motivation to learn in a self‐directed online course
MJ Simmering, C Posey, G Piccoli
Decision Sciences Journal of Innovative Education 7 (1), 99-121, 2009
When computer monitoring backfires: Invasion of privacy and organizational injustice as precursors to computer abuse
C Posey, B Bennett, T Roberts, PB Lowry
Journal of Information System Security 7 (1), 24-47, 2011
Understanding the mindset of the abusive insider: An examination of insiders’ causal reasoning following internal security changes
C Posey, RJ Bennett, TL Roberts
Computers & Security 30 (6-7), 486-497, 2011
Is your banker leaking your personal information? The roles of ethics and individual-level cultural characteristics in predicting organizational computer abuse
PB Lowry, C Posey, TL Roberts, RJ Bennett
Journal of Business Ethics 121, 385-401, 2014
The adaptive roles of positive and negative emotions in organizational insiders’ security-based precaution taking
AJ Burns, TL Roberts, C Posey, PB Lowry
Information Systems Research 30 (4), 1228-1247, 2019
Intentions to comply versus intentions to protect: A VIE theory approach to understanding the influence of insiders’ awareness of organizational SETA efforts
AJ Burns, TL Roberts, C Posey, RJ Bennett, JF Courtney
Decision Sciences 49 (6), 1187-1228, 2018
Taking stock of organisations’ protection of privacy: Categorising and assessing threats to personally identifiable information in the USA
C Posey, U Raja, RE Crossler, AJ Burns
European Journal of Information Systems 26 (6), 585-604, 2017
Robbing Peter to pay Paul: Surrendering privacy for security’s sake in an identity ecosystem
R Crossler, C Posey
Journal of the Association for Information Systems 18 (7), 2, 2017
Organizational information security as a complex adaptive system: insights from three agent-based models
AJ Burns, C Posey, JF Courtney, TL Roberts, P Nanayakkara
Information Systems Frontiers 19, 509-524, 2017
Multiple indicators and multiple causes (MIMIC) models as a mixed-modelling technique: A tutorial and an annotated example
C Posey, T Roberts, PB Lowry, B Bennett
Communications of the Association for Information Systems 36 (11), 2014
Motivating the insider to protect organizational information assets: Evidence from protection motivation theory and rival explanations
C Posey, T Roberts, PB Lowry, J Courtney, B Bennett
The Dewald Roode workshop in information systems security, 22-23, 2011
Assessing the role of security education, training, and awareness on insiders' security-related behavior: An expectancy theory approach
AJ Burns, TL Roberts, C Posey, RJ Bennett, JF Courtney
2015 48th Hawaii International Conference on System Sciences, 3930-3940, 2015
Organizational science and cybersecurity: abundant opportunities for research at the interface
RS Dalal, DJ Howard, RJ Bennett, C Posey, SJ Zaccaro, BJ Brummel
Journal of business and psychology 37 (1), 1-29, 2022
Job Applicants' Information Privacy Protection Responses: Using Socia Media for Candidate Screening
JR Drake, D Hall, JB Becton, C Posey
Transactions on Human-Computer Interaction 8 (4), 160, 2016
The system can't perform the operation now. Try again later.
Articles 1–20