Examining the relationship of organizational insiders' psychological capital with information security threat and coping appraisals AJ Burns, C Posey, TL Roberts, PB Lowry Computers in Human Behavior 68, 190-209, 2017 | 176 | 2017 |
A brief chronology of medical device security AJ Burns, ME Johnson, P Honeyman Communications of the ACM 59 (10), 66-72, 2016 | 64 | 2016 |
The adaptive roles of positive and negative emotions in organizational insiders’ security-based precaution taking AJ Burns, TL Roberts, C Posey, PB Lowry Information Systems Research 30 (4), 1228-1247, 2019 | 62 | 2019 |
Intentions to comply versus intentions to protect: A VIE theory approach to understanding the influence of insiders’ awareness of organizational SETA efforts AJ Burns, TL Roberts, C Posey, RJ Bennett, JF Courtney Decision Sciences 49 (6), 1187-1228, 2018 | 57 | 2018 |
Spear phishing in a barrel: Insights from a targeted phishing campaign AJ Burns, ME Johnson, DD Caputo Journal of Organizational Computing and Electronic Commerce 29 (1), 24-39, 2019 | 54 | 2019 |
Taking stock of organisations’ protection of privacy: Categorising and assessing threats to personally identifiable information in the USA C Posey, U Raja, RE Crossler, AJ Burns European Journal of Information Systems 26 (6), 585-604, 2017 | 43 | 2017 |
Organizational information security as a complex adaptive system: insights from three agent-based models AJ Burns, C Posey, JF Courtney, TL Roberts, P Nanayakkara Information Systems Frontiers 19 (3), 509–524, 2017 | 41 | 2017 |
Assessing the Role of Security Education, Training, and Awareness on Insiders’ Security-related Behavior: An Expectancy Theory Approach AJ Burns, TL Roberts, C Posey, RJ Bennett, JF Courtney | 35 | 2015 |
Securing health information AJ Burns, ME Johnson IT professional 17 (1), 23-29, 2015 | 31 | 2015 |
Exploring the role of contextual integrity in electronic medical record (EMR) system workaround decisions: an information security and privacy perspective AJ Burns, J Young, TL Roberts, JF Courtney, TS Ellis AIS Transactions on Human-Computer Interaction 7 (3), 142-165, 2015 | 25 | 2015 |
Security Organizing: A Framework for Organizational Information Security Mindfulness AJ Burns The Data Base for Advances in Information Systems 50 (4), 14-27, 2019 | 13 | 2019 |
Insiders’ adaptations to security-based demands in the workplace: An examination of security behavioral complexity AJ Burns, C Posey, TL Roberts Information Systems Frontiers 23, 343-360, 2021 | 11 | 2021 |
The evolving cyberthreat to privacy AJ Burns, E Johnson IT Professional 20 (3), 64-72, 2018 | 11 | 2018 |
The impact of ability and participation on trustworthiness and task performance in virtual teams CM Fuller, DP Twitchell, K Marett, AJ Burns International Journal of Social and Organizational Dynamics in IT (IJSODIT …, 2012 | 2 | 2012 |
Complex Adaptive Systems, Agent-Based Modeling and Information Assurance A Burns, P Nanayakkara, J Courtney, T Roberts | 2 | 2012 |
Going beyond deterrence: A middle-range theory of motives and controls for insider computer abuse AJ Burns, TL Roberts, C Posey, PB Lowry, B Fuller Information Systems Research 34 (1), 342-362, 2023 | 1 | 2023 |
The Backstory of “An Adversarial Dance” DE Leidner, AJ Burns, P Balozian Journal of the Association for Information Systems 24 (2), 336-344, 2023 | 1 | 2023 |
Protecting Organizational Information Assets: Exploring the Influence of Regulatory Focus on Rational Choices AJ Burns | 1 | 2021 |
An Adversarial Dance: Toward an Understanding of Insiders’ Responses to Organizational Information Security Measures P Balozian, AJ Burns, DE Leidner Journal of the Association for Information Systems 24 (1), 161-221, 2023 | | 2023 |