关注
John D'Arcy
John D'Arcy
Professor of MIS, University of Delaware
在 udel.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach
J D'Arcy, A Hovav, D Galletta
Information systems research 20 (1), 79-98, 2009
17932009
Understanding employee responses to stressful information security requirements: A coping perspective
J D'Arcy, T Herath, MK Shoss
Journal of management information systems 31 (2), 285-318, 2014
7162014
A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings
J D'arcy, T Herath
European journal of information systems 20 (6), 643-658, 2011
5962011
Trust and leadership in virtual teamwork: A media naturalness perspective
DM DeRosa, DA Hantula, N Kock, J D'Arcy
Human Resource Management: Published in Cooperation with the School of …, 2004
3932004
Applying an extended model of deterrence across cultures: An investigation of information systems misuse in the US and South Korea
A Hovav, J D’Arcy
Information & Management 49 (2), 99-110, 2012
3632012
“Cargo Cult” science in traditional organization and information systems survey research: A case for using nontraditional methods of data collection, including Mechanical Turk …
PB Lowry, J D’Arcy, B Hammer, GD Moody
The Journal of Strategic Information Systems 25 (3), 232-240, 2016
3552016
Seeing the Forest and the Trees: A Meta-Analysis of the Antecedents to Information Security Policy Compliance.
WA Cram, J D’Arcy, JG Proudfoot
MIS Quarterly 43 (2), 525-554, 2019
3412019
The impact of denialofservice attack announcements on the market value of firms
A Hovav, J D'Arcy
Risk Management and Insurance Review 6 (2), 97-121, 2003
3342003
Organizational information security policies: a review and research framework
WA Cram, JG Proudfoot, J D’arcy
European Journal of Information Systems 26 (6), 605-641, 2017
3142017
The dark side of information technology
M Tarafdar, J D’arcy, O Turel, A Gupta
MIT Sloan Management Review, 2014
2952014
When do IT security investments matter? Accounting for the influence of institutional factors in the context of healthcare data breaches
CM Angst, ES Block, J D’Arcy, K Kelley
MIS quarterly 41 (3), 893-A8, 2017
2692017
Does one size fit all? Examining the differential effects of IS security countermeasures
J D’Arcy, A Hovav
Journal of business ethics 89, 59-71, 2009
2612009
Cognitiveaffective drivers of employees' daily compliance with information security policies: A multilevel, longitudinal study
J D'Arcy, PB Lowry
Information Systems Journal 29 (1), 43-69, 2019
2472019
Deterring internal information systems misuse
J D'Arcy, A Hovav
Communications of the ACM 50 (10), 113-117, 2007
2362007
Reflecting on the “dark side” of information technology use
J D’Arcy, A Gupta, M Tarafdar, O Turel
Communications of the Association for Information Systems 35 (1), 5, 2014
2342014
Employee misuse of information technology resources: Testing a contemporary deterrence model
J D'Arcy, S Devaraj
Decision Sciences 43 (6), 1091-1124, 2012
2212012
Security culture and the employment relationship as drivers of employees’ security compliance
J D'Arcy, G Greene
Information Management & Computer Security 22 (5), 474-489, 2014
2162014
Predicting employee information security policy compliance on a daily basis: The interplay of security-related stress, emotions, and neutralization
J D’Arcy, PL Teh
Information & Management 56 (7), 103151, 2019
1472019
The impact of virus attack announcements on the market value of firms.
A Hovav, J D'Arcy
WOSIS, 146-156, 2004
1442004
An exploratory investigation of message-person congruence in information security awareness campaigns
M Kajzer, J D'Arcy, CR Crowell, A Striegel, D Van Bruggen
Computers & security 43, 64-76, 2014
1122014
系统目前无法执行此操作,请稍后再试。
文章 1–20