Takip et
John D'Arcy
John D'Arcy
Professor of MIS, University of Delaware
udel.edu üzerinde doğrulanmış e-posta adresine sahip - Ana Sayfa
Başlık
Alıntı yapanlar
Alıntı yapanlar
Yıl
User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach
J D'Arcy, A Hovav, D Galletta
Information systems research 20 (1), 79-98, 2009
18812009
Understanding employee responses to stressful information security requirements: A coping perspective
J D'Arcy, T Herath, MK Shoss
Journal of management information systems 31 (2), 285-318, 2014
7872014
A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings
J D'arcy, T Herath
European journal of information systems 20 (6), 643-658, 2011
6402011
Trust and leadership in virtual teamwork: A media naturalness perspective
DM DeRosa, DA Hantula, N Kock, J D'Arcy
Human Resource Management: Published in Cooperation with the School of …, 2004
4012004
Seeing the Forest and the Trees: A Meta-Analysis of the Antecedents to Information Security Policy Compliance.
WA Cram, J D’Arcy, JG Proudfoot
MIS Quarterly 43 (2), 525-554, 2019
3932019
“Cargo Cult” science in traditional organization and information systems survey research: A case for using nontraditional methods of data collection, including Mechanical Turk …
PB Lowry, J D’Arcy, B Hammer, GD Moody
The Journal of Strategic Information Systems 25 (3), 232-240, 2016
3882016
Applying an extended model of deterrence across cultures: An investigation of information systems misuse in the US and South Korea
A Hovav, J D’Arcy
Information & Management 49 (2), 99-110, 2012
3822012
Organizational information security policies: a review and research framework
WA Cram, JG Proudfoot, J D’arcy
European Journal of Information Systems 26 (6), 605-641, 2017
3492017
The impact of denial‐of‐service attack announcements on the market value of firms
A Hovav, J D'Arcy
Risk Management and Insurance Review 6 (2), 97-121, 2003
3432003
The dark side of information technology
M Tarafdar, J D’arcy, O Turel, A Gupta
MIT Sloan Management Review, 2014
3252014
When do IT security investments matter? Accounting for the influence of institutional factors in the context of healthcare data breaches
CM Angst, ES Block, J D’Arcy, K Kelley
MIS quarterly 41 (3), 893-A8, 2017
3172017
Cognitive‐affective drivers of employees' daily compliance with information security policies: A multilevel, longitudinal study
J D'Arcy, PB Lowry
Information Systems Journal 29 (1), 43-69, 2019
2812019
Does one size fit all? Examining the differential effects of IS security countermeasures
J D’Arcy, A Hovav
Journal of business ethics 89, 59-71, 2009
2672009
Deterring internal information systems misuse
J D'Arcy, A Hovav
Communications of the ACM 50 (10), 113-117, 2007
2502007
Reflecting on the “dark side” of information technology use
J D’Arcy, A Gupta, M Tarafdar, O Turel
Communications of the Association for Information Systems 35 (1), 5, 2014
2492014
Employee misuse of information technology resources: Testing a contemporary deterrence model
J D'Arcy, S Devaraj
Decision Sciences 43 (6), 1091-1124, 2012
2332012
Security culture and the employment relationship as drivers of employees’ security compliance
J D'Arcy, G Greene
Information Management & Computer Security 22 (5), 474-489, 2014
2302014
Predicting employee information security policy compliance on a daily basis: The interplay of security-related stress, emotions, and neutralization
J D’Arcy, PL Teh
Information & Management 56 (7), 103151, 2019
1852019
The impact of virus attack announcements on the market value of firms.
A Hovav, J D'Arcy
WOSIS, 146-156, 2004
1502004
An exploratory investigation of message-person congruence in information security awareness campaigns
M Kajzer, J D'Arcy, CR Crowell, A Striegel, D Van Bruggen
Computers & security 43, 64-76, 2014
1172014
Sistem, işlemi şu anda gerçekleştiremiyor. Daha sonra yeniden deneyin.
Makaleler 1–20