James Courtney

Independent

No Address Available

SCHOLARLY PAPERS

3

DOWNLOADS

526

CITATIONS

2

Scholarly Papers (3)

1.

Insiders’ Protection of Organizational Information Assets: Development of a Systematics-Based Taxonomy and Theory of Diversity for Protection-Motivated Behaviors

MIS Quarterly, Vol. 37(4), pp. 1189-1210
Number of pages: 59 Posted: 11 Nov 2012 Last Revised: 09 Sep 2013
The University of Alabama, University of Kansas - School of Business, The University of Hong Kong - School of Business, Louisiana Tech University - Department of Management and Information Systems and Independent
Downloads 87 (89,807)

Abstract:

Protection-motivated behaviors, behavioral information security, systematics, theory of diversity, multidimensional scaling, cluster analysis, taxonomy

2.

Motivating the Insider to Protect Organizational Information Assets: Evidence from Protection Motivation Theory and Rival Explanations

The Dewald Roode Workshop in Information Systems Security 2011, Blacksburg, Virginia, USA, September 22–23, pp. 1–51,
Number of pages: 52 Posted: 05 Jun 2013
The University of Alabama, University of Kansas - School of Business, The University of Hong Kong - School of Business, Independent and Louisiana Tech University - Department of Management and Information Systems
Downloads 71 (127,723)
Citation 1

Abstract:

Protection-motivated behaviors, protection motivation theory, threat appraisal, coping appraisal, MIMIC model, job satisfaction, management support, structural equation modeling

3.

Insiders' Protection of Organizational Information Assets: A Multidimensional Scaling Study of Protection-Motivated Behaviors

Roode Workshop on IS Security Research, Boston, MA, USA, October 8-9, 2010
Number of pages: 51 Posted: 30 Aug 2010 Last Revised: 06 Sep 2014
The University of Alabama, University of Kansas - School of Business, The University of Hong Kong - School of Business, Louisiana Tech University - Department of Management and Information Systems and Independent
Downloads 20 (361,459)
Citation 1

Abstract:

Protection-motivated behaviors, behavioral information security, information assurance, multidimensional scaling, cluster analysis, typology formation