Seguir
Allen C. Johnston
Allen C. Johnston
Hewson Professor of Cybersecurity, University of Alabama
Dirección de correo verificada de ua.edu
Título
Citado por
Citado por
Año
Fear appeals and information security behaviors: an empirical study
AC Johnston, M Warkentin
MIS Quarterly, 549-566, 2010
17442010
Future directions for behavioral information security research
RE Crossler, AC Johnston, PB Lowry, Q Hu, M Warkentin, R Baskerville
Computers & Security 32, 90-101, 2013
9802013
An enhanced fear appeal rhetorical framework: Leveraging threats to the human asset through sanctioning rhetoric
AC Johnston, M Warkentin, M Siponen
MIS Quarterly 39 (1), 113-134, 2015
5932015
The influence of the informal social learning environment on information privacy policy compliance efficacy and intention
M Warkentin, AC Johnston, J Shropshire
European Journal of Information Systems 20, 267-284, 2011
3312011
Dispositional and situational factors: influences on information security policy violations
AC Johnston, M Warkentin, M McBride, L Carter
European Journal of Information Systems 25 (3), 231-251, 2016
2692016
Online health communities: An assessment of the influence of participation on patient empowerment outcomes
AC Johnston, JL Worrell, PM Di Gangi, M Wasko
Information Technology & People 26 (2), 213-235, 2013
2342013
Examining employee computer abuse intentions: Insights from justice, deterrence and neutralization perspectives
R Willison, M Warkentin, AC Johnston
Information Systems Journal 28 (2), 266-293, 2018
1752018
Improved security through information security governance
AC Johnston, R Hale
Communications of the ACM 52 (1), 126-129, 2009
1662009
Continuance of protective security behavior: A longitudinal study
M Warkentin, AC Johnston, J Shropshire, WD Barnett
Decision Support Systems 92, 25-35, 2016
1612016
Information security management objectives and practices: a parsimonious framework
Q Ma, AC Johnston, JM Pearson
Information Management & Computer Security 16 (3), 251-270, 2008
1432008
Neural correlates of protection motivation for secure IT behaviors: An fMRI examination
M Warkentin, E Walden, AC Johnston, DW Straub
Journal of the Association for Information Systems 17 (3), 1, 2016
1412016
Individuals’ privacy concerns and adoption of contact tracing mobile applications in a pandemic: A situational privacy calculus perspective
F Hassandoust, S Akhlaghpour, AC Johnston
Journal of the American Medical Informatics Association 28 (3), 463-471, 2021
1302021
Personality and IT security: An application of the five-factor model
J Shropshire, M Warkentin, A Johnston, M Schmidt
AMCIS 2006 Proceedings, 415, 2006
1082006
Social network analysis in accounting information systems research
J Worrell, M Wasko, A Johnston
International Journal of Accounting Information Systems 14 (2), 127-137, 2013
972013
Speak their language: Designing effective messages to improve employees’ information security decision making
AC Johnston, M Warkentin, AR Dennis, M Siponen
Decision Sciences 50 (2), 245-284, 2019
812019
Information privacy compliance in the healthcare industry
AC Johnston, M Warkentin
Information Management & Computer Security 16 (1), 5-19, 2008
702008
The influence of perceived source credibility on end user attitudes and intentions to comply with recommended IT actions
AC Johnston, M Warkentin
Journal of Organizational and End User Computing (JOEUC) 22 (3), 1-21, 2010
682010
Analysis of systems development project risks: An integrative framework
M Warkentin, RS Moore, E Bekkering, AC Johnston
ACM SIGMIS Database: the DATABASE for Advances in Information Systems 40 (2 …, 2009
682009
IT governance and organizational design for security management
M Warkentin, AC Johnston
Information security, 46-68, 2016
602016
Running field experiments using Facebook split test
DC Orazi, AC Johnston
Journal of Business Research 118, 189-198, 2020
542020
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20