Seuraa
Allen C. Johnston
Allen C. Johnston
Hewson Professor of Cybersecurity, University of Alabama
Vahvistettu sähköpostiosoite verkkotunnuksessa ua.edu
Nimike
Viittaukset
Viittaukset
Vuosi
Fear appeals and information security behaviors: an empirical study
AC Johnston, M Warkentin
MIS Quarterly, 549-566, 2010
17312010
Future directions for behavioral information security research
RE Crossler, AC Johnston, PB Lowry, Q Hu, M Warkentin, R Baskerville
Computers & Security 32, 90-101, 2013
9782013
An enhanced fear appeal rhetorical framework: Leveraging threats to the human asset through sanctioning rhetoric
AC Johnston, M Warkentin, M Siponen
MIS Quarterly 39 (1), 113-134, 2015
5802015
The influence of the informal social learning environment on information privacy policy compliance efficacy and intention
M Warkentin, AC Johnston, J Shropshire
European Journal of Information Systems 20, 267-284, 2011
3272011
Dispositional and situational factors: influences on information security policy violations
AC Johnston, M Warkentin, M McBride, L Carter
European Journal of Information Systems 25 (3), 231-251, 2016
2642016
Online health communities: An assessment of the influence of participation on patient empowerment outcomes
AC Johnston, JL Worrell, PM Di Gangi, M Wasko
Information Technology & People 26 (2), 213-235, 2013
2352013
Examining employee computer abuse intentions: Insights from justice, deterrence and neutralization perspectives
R Willison, M Warkentin, AC Johnston
Information Systems Journal 28 (2), 266-293, 2018
1732018
Improved security through information security governance
AC Johnston, R Hale
Communications of the ACM 52 (1), 126-129, 2009
1642009
Continuance of protective security behavior: A longitudinal study
M Warkentin, AC Johnston, J Shropshire, WD Barnett
Decision Support Systems 92, 25-35, 2016
1602016
Information security management objectives and practices: a parsimonious framework
Q Ma, AC Johnston, JM Pearson
Information Management & Computer Security 16 (3), 251-270, 2008
1432008
Neural correlates of protection motivation for secure IT behaviors: An fMRI examination
M Warkentin, E Walden, AC Johnston, DW Straub
Journal of the Association for Information Systems 17 (3), 1, 2016
1372016
Individuals’ privacy concerns and adoption of contact tracing mobile applications in a pandemic: A situational privacy calculus perspective
F Hassandoust, S Akhlaghpour, AC Johnston
Journal of the American Medical Informatics Association 28 (3), 463-471, 2021
1302021
Personality and IT security: An application of the five-factor model
J Shropshire, M Warkentin, A Johnston, M Schmidt
AMCIS 2006 Proceedings, 415, 2006
1072006
Social network analysis in accounting information systems research
J Worrell, M Wasko, A Johnston
International Journal of Accounting Information Systems 14 (2), 127-137, 2013
972013
Speak their language: Designing effective messages to improve employees’ information security decision making
AC Johnston, M Warkentin, AR Dennis, M Siponen
Decision Sciences 50 (2), 245-284, 2019
802019
Information privacy compliance in the healthcare industry
AC Johnston, M Warkentin
Information Management & Computer Security 16 (1), 5-19, 2008
702008
The influence of perceived source credibility on end user attitudes and intentions to comply with recommended IT actions
AC Johnston, M Warkentin
Journal of Organizational and End User Computing (JOEUC) 22 (3), 1-21, 2010
682010
Analysis of systems development project risks: An integrative framework
M Warkentin, RS Moore, E Bekkering, AC Johnston
ACM SIGMIS Database: the DATABASE for Advances in Information Systems 40 (2 …, 2009
682009
IT governance and organizational design for security management
M Warkentin, AC Johnston
Information security, 46-68, 2016
592016
A cross-cultural comparison of US and Chinese computer security awareness
MB Schmidt, AC Johnston, KP Arnett, JQ Chen, S Li
Journal of Global Information Management (JGIM) 16 (2), 91-103, 2008
542008
Järjestelmä ei voi suorittaa toimenpidettä nyt. Yritä myöhemmin uudelleen.
Artikkelit 1–20