default search action
Allen C. Johnston
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c31]Weijie Zhao, Allen C. Johnston, Mikko T. Siponen:
Intuition or Analysis? Investigation of Employees' Cognitive Mode of Information Security Policy Compliance. AMCIS 2024 - [c30]Anthony Vance, Karen Renaud, Allen C. Johnston, Merrill Warkentin:
Introduction to the Minitrack on Innovative Behavioral IS Security and Privacy Research. HICSS 2024: 4712-4713 - 2023
- [j32]Allen C. Johnston, Paul Michael Di Gangi, France Bélanger, Robert E. Crossler, Mikko T. Siponen, Merrill Warkentin, Tripti Singh:
Seeking rhetorical validity in fear appeal research: An application of rhetorical theory. Comput. Secur. 125: 103020 (2023) - [j31]Farkhondeh Hassandoust, Allen C. Johnston:
Peering through the lens of high-reliability theory: A competencies driven security culture model of high-reliability organisations. Inf. Syst. J. 33(5): 1212-1238 (2023) - [c29]Anthony Vance, Merrill Warkentin, Allen C. Johnston:
Introduction to the Minitrack on Innovative Behavioral IS Security and Privacy Research. HICSS 2023: 4119-4120 - 2022
- [j30]Teagen Nabity-Grover, Jason Bennett Thatcher, Allen C. Johnston:
Contextualizing Self-disclosure to the Online Environment: An Assessment of the Literature. Commun. Assoc. Inf. Syst. 50: 39 (2022) - [j29]Farkhondeh Hassandoust, Maduka Subasinghage, Allen C. Johnston:
A neo-institutional perspective on the establishment of information security knowledge sharing practices. Inf. Manag. 59(1): 103574 (2022) - [j28]P. D. Harms, Alexander Marbut, Allen C. Johnston, Paul Lester, Tyler Fezzey:
Exposing the darkness within: A review of dark personality traits, models, and measures and their relationship to insider threats. J. Inf. Secur. Appl. 71: 103378 (2022) - [c28]Farkhondeh Hassandoust, Allen C. Johnston, Roxana Ologeanu-Taddeï, Saeed Akhlaghpour:
From liking to not liking: A proposed experiment design to explore consumer perceptions of health wearable notifications. ACIS 2022: 60 - [c27]Merrill Warkentin, Allen C. Johnston, Anthony Vance:
Introduction to the Minitrack on Innovative Behavioral IS Security and Privacy Research. HICSS 2022: 1 - 2021
- [j27]Farkhondeh Hassandoust, Saeed Akhlaghpour, Allen C. Johnston:
Individuals' privacy concerns and adoption of contact tracing mobile applications in a pandemic: A situational privacy calculus perspective. J. Am. Medical Informatics Assoc. 28(3): 463-471 (2021) - [c26]Robert E. Crossler, France Bélanger, Carlos Torres, Allen C. Johnston, Merrill Warkentin:
Understanding Unstable Information Systems Phenomena: A Punctuated Equilibrium Perspective. HICSS 2021: 1-10 - [c25]Merrill Warkentin, Allen C. Johnston, Anthony Vance:
Introduction to the Minitrack on Innovative Behavioral IS Security and Privacy Research. HICSS 2021: 1 - [c24]Farkhondeh Hassandoust, Allen C. Johnston, Tripti Singh:
Smart Pay-As-You-Live Services in Healthcare: A Balance Theory Perspective. ICIS 2021 - [p2]Isabel Ramos, Dale Mackrell, Alta van der Merwe, Jan Pries-Heje, Jolita Ralyté, Janis Stirna, John Krogstie, Matthew Jones, Benjamin Mueller, Frédéric Adam, Bettina Jaber, Edgar R. Weippl, Marijn Janssen, Amany R. Elbanna, Banita Lal, Pierluigi Plebani, Allen C. Johnston, Li Da Xu:
The Future of Information Systems in a Post-COVID World by TC8 (Information Systems). IFIP's Exciting First 60+ Years 2021: 333-360 - [p1]Steven Furnell, Paul S. Haskell-Dowland, Manish Agrawal, Richard L. Baskerville, Anirban Basu, Matt Bishop, Jorge Cuéllar, Sara Foresti, Lynn Futcher, Nurit Gal-Oz, Tejaswini (Teju) Herath, Christian Damsgaard Jensen, Allen C. Johnston, Wouter Joosen, Giovanni Livraga, Javier López, Stephen Marsh, Fabio Martinelli, Fabio Massacci, Aljosa Pasic, Stef Schinagl, Abbas Shahim, Kerry-Lynn Thomson, Jaideep Vaidya, Tony Vance, Merrill Warkentin:
Information Security and Privacy - Challenges and Outlook. IFIP's Exciting First 60+ Years 2021: 383-401 - 2020
- [c23]Farkhondeh Hassandoust, Allen C. Johnston:
Deployment of Information Security Practices: The High Reliability Theory Perspective. ACIS 2020: 1 - [c22]Tripti Singh, Allen C. Johnston:
Security in the Software Development Process: Role of Human Factors. AMCIS 2020 - [c21]Allen C. Johnston, Merrill Warkentin, Anthony Vance:
Introduction to the Minitrack on Innovative Behavioral IS Security and Privacy Research. HICSS 2020: 1
2010 – 2019
- 2019
- [j26]Davide C. Orazi, Merrill Warkentin, Allen C. Johnston:
Integrating Construal-level Theory in Designing Fear Appeals in IS Security Research. Commun. Assoc. Inf. Syst. 45: 22 (2019) - [j25]Allen C. Johnston, Merrill Warkentin, Alan R. Dennis, Mikko T. Siponen:
Speak their Language: Designing Effective Messages to Improve Employees' Information Security Decision Making. Decis. Sci. 50(2): 245-284 (2019) - [j24]Allen C. Johnston, Paul Michael Di Gangi, Jack L. Howard, James L. Worrell:
It Takes a Village: Understanding the Collective Security Efficacy of Employee Groups. J. Assoc. Inf. Syst. 20(3): 3 (2019) - [c20]Merrill Warkentin, Allen C. Johnston, Anthony Vance:
Introduction to the Minitrack on Innovative Behavioral IS Security and Privacy Research. HICSS 2019: 1 - [c19]Fenne große Deters, Stefan Tams, Allen C. Johnston, Jason Thatcher:
Designing Experimental Studies. ICIS 2019 - [c18]Tripti Singh, Allen C. Johnston:
How Much is Too Much: Employee Monitoring, Surveillance, and Strain. ICIS 2019 - [c17]Ning Yang, Allen C. Johnston:
The Application of Operant Conditioning Theory in Employees' IS Security Behavioral Management. ICIS 2019 - 2018
- [j23]Robert E. Crossler, Paul Michael Di Gangi, Allen C. Johnston, France Bélanger, Merrill Warkentin:
Providing Theoretical Foundations: Developing an Integrated Set of Guidelines for Theory Adaptation. Commun. Assoc. Inf. Syst. 43: 31 (2018) - [j22]Paul Michael Di Gangi, Allen C. Johnston, James L. Worrell, Samuel C. Thompson:
What could possibly go wrong? A multi-panel Delphi study of organizational social media risk. Inf. Syst. Frontiers 20(5): 1097-1116 (2018) - [j21]Robert Willison, Merrill Warkentin, Allen C. Johnston:
Examining employee computer abuse intentions: insights from justice, deterrence and neutralization perspectives. Inf. Syst. J. 28(2): 266-293 (2018) - [c16]Tripti Singh, Allen C. Johnston, Paul Michael Di Gangi, Gregory Bott:
An Examination of Risk Perceptions and Protected Health Information Disclosure Intentions: A Construal Level Theory Perspective. AMCIS 2018 - [c15]Merrill Warkentin, Allen C. Johnston, Anthony Vance:
Introduction to the Minitrack on Innovative Behavioral IS Security and Privacy Research. HICSS 2018: 1 - 2017
- [c14]Merrill Warkentin, Allen C. Johnston, Anthony Vance:
Introduction to Innovative Behavioral IS Security and Privacy Research Minitrack. HICSS 2017: 1 - 2016
- [j20]James Lee, Merrill Warkentin, Allen C. Johnston:
A Broader View of Perceived Risk during Internet Transactions. Commun. Assoc. Inf. Syst. 38: 8 (2016) - [j19]Merrill Warkentin, Allen C. Johnston, Jordan Shropshire, William D. Barnett:
Continuance of protective security behavior: A longitudinal study. Decis. Support Syst. 92: 25-35 (2016) - [j18]Allen C. Johnston, Merrill Warkentin, Maranda E. McBride, Lemuria D. Carter:
Dispositional and situational factors: influences on information security policy violations. Eur. J. Inf. Syst. 25(3): 231-251 (2016) - [j17]Merrill Warkentin, Eric A. Walden, Allen C. Johnston, Detmar W. Straub:
Neural Correlates of Protection Motivation for Secure IT Behaviors: An fMRI Examination. J. Assoc. Inf. Syst. 17(3): 1 (2016) - [c13]Merrill Warkentin, Anthony Vance, Allen C. Johnston:
Introduction to the Minitrack on Innovative Behavioral IS Security and Privacy Research. HICSS 2016: 3635 - 2015
- [j16]Allen C. Johnston, Merrill Warkentin, Mikko T. Siponen:
An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to the Human Asset Through Sanctioning Rhetoric. MIS Q. 39(1): 113-134 (2015) - [c12]Merrill Warkentin, Allen C. Johnston, Anthony Vance:
Introduction to the Innovative Behavioral IS Security and Privacy Research Minitrack. HICSS 2015: 3452 - [c11]Julio C. Rivera, Paul Michael Di Gangi, Allen C. Johnston, James L. Worrell:
Undergraduate student perceptions of personal social media risk. InfoSecCD 2015: 8:1 - 2014
- [c10]Merrill Warkentin, Allen C. Johnston, Anthony Vance:
Introduction to Innovative Behavioral IS Security and Privacy Research Minitrack. HICSS 2014: 3148 - 2013
- [j15]Robert E. Crossler, Allen C. Johnston, Paul Benjamin Lowry, Qing Hu, Merrill Warkentin, Richard L. Baskerville:
Future directions for behavioral information security research. Comput. Secur. 32: 90-101 (2013) - [j14]James Worrell, Molly Wasko, Allen C. Johnston:
Social network analysis in accounting information systems research. Int. J. Account. Inf. Syst. 14(2): 127-137 (2013) - [j13]Allen C. Johnston, James L. Worrell, Paul Michael Di Gangi, Molly Wasko:
Online health communities: An assessment of the influence of participation on patient empowerment outcomes. Inf. Technol. People 26(2): 213-235 (2013) - [j12]Allen C. Johnston, Barbara Wech, Eric Jack:
Engaging Remote Employees: The Moderating Role of "Remote" Status in Determining Employee Information Security Policy Awareness. J. Organ. End User Comput. 25(1): 1-23 (2013) - 2012
- [c9]Merrill Warkentin, Maranda E. McBride, Lemuria D. Carter, Allen C. Johnston:
The Role of Individual Characteristics on Insider Abuse Intentions. AMCIS 2012 - 2011
- [j11]Merrill Warkentin, Allen C. Johnston, Jordan Shropshire:
The influence of the informal social learning environment on information privacy policy compliance efficacy and intention. Eur. J. Inf. Syst. 20(3): 267-284 (2011) - [c8]Merrill Warkentin, Robert Willison, Allen C. Johnston:
The Role of Perceptions of Organizational Injustice and Techniques of Neutralization in Forming Computer Abuse Intentions. AMCIS 2011 - 2010
- [j10]Jordan Shropshire, Merrill Warkentin, Allen C. Johnston:
Impact of Negative Message Framing on Security Adoption. J. Comput. Inf. Syst. 51(1): 41-51 (2010) - [j9]Allen C. Johnston, Merrill Warkentin:
The Influence of Perceived Source Credibility on End User Attitudes and Intentions to Comply with Recommended IT Actions. J. Organ. End User Comput. 22(3): 1-21 (2010) - [j8]Allen C. Johnston, Merrill Warkentin:
Fear Appeals and Information Security Behaviors: An Empirical Study. MIS Q. 34(3): 549-566 (2010) - [c7]Allen C. Johnston, Barbara Wech, Eric Jack, Micah Beavers:
Reigning in the Remote Employee: Applying Social Learning Theory to Explain Information Security Policy Compliance Attitudes. AMCIS 2010: 493
2000 – 2009
- 2009
- [j7]Allen C. Johnston, Ron Hale:
Improved security through information security governance. Commun. ACM 52(1): 126-129 (2009) - [j6]Merrill Warkentin, Robert S. Moore, Ernst Bekkering, Allen C. Johnston:
Analysis of systems development project risks: an integrative framework. Data Base 40(2): 8-27 (2009) - [j5]Ernst Bekkering, Allen C. Johnston, Merrill Warkentin, Mark B. Schmidt:
An Empirical Assessment of Technology Adoption as a Choice between Alternatives. Inf. Resour. Manag. J. 22(4): 23-44 (2009) - [c6]Xin (Robert) Luo, Merrill Warkentin, Allen C. Johnston:
The Impact of National Culture on Workplace Privacy Expectations in the Context of Information Security Assurance. AMCIS 2009: 521 - 2008
- [j4]Allen C. Johnston, Merrill Warkentin:
Information privacy compliance in the healthcare industry. Inf. Manag. Comput. Secur. 16(1): 5-19 (2008) - [j3]Qingxiong Ma, Allen C. Johnston, J. Michael Pearson:
Information security management objectives and practices: a parsimonious framework. Inf. Manag. Comput. Secur. 16(3): 251-270 (2008) - [j2]Mark B. Schmidt, Allen C. Johnston, Kirk P. Arnett, Jim Q. Chen, Suichen Li:
A Cross-Cultural Comparison of U.S. and Chinese Computer Security Awareness. J. Glob. Inf. Manag. 16(2): 91-103 (2008) - 2007
- [j1]Kirk P. Arnett, Mark B. Schmidt, Allen C. Johnston, Jongki Kim, Ha Jin Hwang:
Rootkits and What we Know: Assessing US and Korean Knowledge and Perceptions. Int. J. Inf. Secur. Priv. 1(4): 75-86 (2007) - [c5]Merrill Warkentin, Ernst Bekkering, Allen C. Johnston, Robert S. Moore:
Risk Perspectives in Systems Development. AMCIS 2007: 273 - [c4]Merrill Warkentin, Jordan Shropshire, Allen C. Johnston:
The IT Security Adoption Conundrum: An Initial Step Toward Validation of Applicable Measures. AMCIS 2007: 276 - [r1]Reggie Becker, Mark B. Schmidt, Allen C. Johnston:
Mitigation of Identity Theft in the Information Age. Encyclopedia of Information Ethics and Security 2007: 451-456 - 2006
- [c3]Merrill Warkentin, Allen C. Johnston, April Adams:
User Interaction with Healthcare Information Systems: Do Healthcare Professionals Want to Comply with HIPAA? AMCIS 2006: 326 - [c2]Jordan Shropshire, Merrill Warkentin, Allen C. Johnston, Mark B. Schmidt:
Personality and IT security: An application of the five-factor model. AMCIS 2006: 415 - 2004
- [c1]Mark B. Schmidt, Allen C. Johnston, Kirk P. Arnett:
Wireless Network Security in Hospitality SMEs. AMCIS 2004: 51
Coauthor Index
aka: Tony Vance
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-26 01:57 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint