Clay Posey

University of Central Florida

4000 Central Florida Blvd

Orlando, FL 32816-1400

United States

SCHOLARLY PAPERS

14

DOWNLOADS
Rank 21,765

SSRN RANKINGS

Top 21,765

in Total Papers Downloads

3,327

SSRN CITATIONS
Rank 7,538

SSRN RANKINGS

Top 7,538

in Total Papers Citations

69

CROSSREF CITATIONS

104

Scholarly Papers (14)

1.

Multiple Indicators and Multiple Causes (MIMIC) Models as a Mixed-Modelling Technique: A Tutorial and an Annotated Example

Communications of the Association for Information Systems, vol. 36(11)
Number of pages: 32 Posted: 17 Nov 2014 Last Revised: 05 Apr 2015
University of Central Florida, University of Kansas - School of Business, Virginia Polytechnic Institute & State University - Pamplin College of Business and Louisiana Tech University - Department of Management and Information Systems
Downloads 955 (34,325)

Abstract:

Loading...

Methodology, Formative Construct Validation, MIMIC Modelling, Covariance-based SEM, Protection-Motivated Behaviors

2.

When Computer Monitoring Backfires: Invasion of Privacy and Organizational Injustice as Precursors to Computer Abuse

Journal of Information System Security, Vol. 7, No. 1, pp. 24-47, 2011
Number of pages: 30 Posted: 13 Nov 2011 Last Revised: 30 Jun 2013
University of Central Florida, Louisiana Tech University - Department of Management and Information Systems, University of Kansas - School of Business and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 673 (55,100)
Citation 2

Abstract:

Loading...

Reactance theory, fairness theory, computer monitoring, computer abuse, privacy invasion, procedural justice, distributive justice, antisocial behavior

3.

Motivating the Insider to Protect Organizational Information Assets: Evidence from Protection Motivation Theory and Rival Explanations

The Dewald Roode Workshop in Information Systems Security 2011, Blacksburg, Virginia, USA, September 22–23, pp. 1–51
Number of pages: 52 Posted: 05 Jun 2013
University of Central Florida, University of Kansas - School of Business, Virginia Polytechnic Institute & State University - Pamplin College of Business, Independent and Louisiana Tech University - Department of Management and Information Systems
Downloads 461 (88,329)
Citation 1

Abstract:

Loading...

Protection-motivated behaviors, protection motivation theory, threat appraisal, coping appraisal, MIMIC model, job satisfaction, management support, structural equation modeling

4.

Insiders’ Protection of Organizational Information Assets: Development of a Systematics-Based Taxonomy and Theory of Diversity for Protection-Motivated Behaviors

MIS Quarterly, Vol. 37(4), pp. 1189-1210
Number of pages: 59 Posted: 11 Nov 2012 Last Revised: 09 Sep 2013
University of Central Florida, University of Kansas - School of Business, Virginia Polytechnic Institute & State University - Pamplin College of Business, Louisiana Tech University - Department of Management and Information Systems and Independent
Downloads 391 (106,880)
Citation 3

Abstract:

Loading...

Protection-motivated behaviors, behavioral information security, systematics, theory of diversity, multidimensional scaling, cluster analysis, taxonomy

5.

The Impact of Organizational Commitment on Insiders’ Motivation to Protect Organizational Information Assets

Journal of Management Information Systems, vol. 32(4), pp. 179–214, 2015
Number of pages: 61 Posted: 08 Aug 2015 Last Revised: 09 May 2016
University of Central Florida, University of Kansas - School of Business and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 238 (179,659)
Citation 11

Abstract:

Loading...

Protection-motivated behaviors, protection motivation theory, threat appraisal, coping appraisal, MIMIC model, security, organizational commitment, structural equation modeling

6.

Proposing the Online Community Self-Disclosure Model: The Case of Working Professionals in France and the UK Who Use Online Communities

European Journal of Information Systems (EJIS), Vol. 19, No. 2, pp. 181-195 (doi:10.1057/ejis.2010.15), 2010
Number of pages: 63 Posted: 08 Nov 2009 Last Revised: 05 Sep 2014
University of Central Florida, Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Kansas - School of Business and Louisiana Tech University - Department of Management and Information Systems
Downloads 132 (298,164)
Citation 28

Abstract:

Loading...

Self-disclosure, social influence, trust, privacy, reciprocity, collectivism, individualism, culture

7.

The Adaptive Roles of Positive and Negative Emotions in Organizational Insiders’ Engagement in Security-Based Precaution Taking

Information Systems Research (ISR), vol. 30(4), pp. 1228–1247 (2019)
Number of pages: 46 Posted: 21 Mar 2019 Last Revised: 02 Jan 2020
Baylor University - Department of Information Systems, University of Kansas - School of Business, University of Central Florida and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 100 (362,302)
Citation 5

Abstract:

Loading...

Information security (InfoSec); organizational security; emotions; precaution taking; broaden-and-build theory (BBT); positive psychology; psychological distancing; psychological capital (PsyCap)

8.

Bridging the Divide: A Qualitative Comparison of Information Security Thought Patterns between Information Security Professionals and Ordinary Organizational Insiders

Information & Management, vol. 51(5), pp. 551–567
Number of pages: 41 Posted: 01 Apr 2014 Last Revised: 08 Jun 2014
University of Central Florida, University of Kansas - School of Business, Virginia Polytechnic Institute & State University - Pamplin College of Business and University of Central Florida
Downloads 90 (387,111)
Citation 7

Abstract:

Loading...

behavioral information security; risk assessment; qualitative analysis; organizational insiders; security professionals; protection motivation theory

9.

Leveraging Fairness and Reactance Theories to Deter Reactive Computer Abuse Following Enhanced Organisational Information Security Policies: An Empirical Study of the Influence of Counterfactual Reasoning and Organisational Trust

Information Systems Journal, vol. 25(3), pp. 193–230 (doi.org/10.1111/isj.12063)
Number of pages: 60 Posted: 06 Jan 2015 Last Revised: 04 Aug 2015
Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Central Florida, Louisiana Tech University - Department of Management and Information Systems and University of Kansas - School of Business
Downloads 75 (430,639)
Citation 6

Abstract:

Loading...

Fairness theory (FT), reactance theory (RT), deterrence theory (DT), counterfactual reasoning, reactive computer abuse (CA), explanation adequacy (EA), organisational trust, security education, training, and awareness (SETA), deterrence, security, organisation communication

10.

Insiders' Protection of Organizational Information Assets: A Multidimensional Scaling Study of Protection-Motivated Behaviors

Roode Workshop on IS Security Research, Boston, MA, USA, October 8-9, 2010
Number of pages: 51 Posted: 30 Aug 2010 Last Revised: 06 Sep 2014
University of Central Florida, University of Kansas - School of Business, Virginia Polytechnic Institute & State University - Pamplin College of Business, Louisiana Tech University - Department of Management and Information Systems and Independent
Downloads 70 (446,934)

Abstract:

Loading...

Protection-motivated behaviors, behavioral information security, information assurance, multidimensional scaling, cluster analysis, typology formation

11.

Examining the Relationship of Organizational Insiders' Psychological Capital with Information Security Threat and Coping Appraisals

Computers in Human Behavior (CHB), Vol. 68 (March), pp. 190-209
Number of pages: 52 Posted: 17 Nov 2016 Last Revised: 27 Feb 2017
Baylor University - Department of Information Systems, University of Central Florida, University of Kansas - School of Business and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 49 (528,684)
Citation 5

Abstract:

Loading...

Information Security, Psychological Capital (PsyCap), Protection Motivation Theory (PMT), Positive Psychology, Organizational Insiders

12.

Is Your Banker Leaking Your Personal Information? The Roles of Ethics and Individual-Level Cultural Characteristics in Predicting Organizational Computer Abuse

Journal of Business Ethics, vol. 121(3), pp. 385–401
Number of pages: 46 Posted: 04 Apr 2013 Last Revised: 08 Jun 2014
Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Central Florida, University of Kansas - School of Business and Louisiana Tech University - Department of Management and Information Systems
Downloads 45 (547,268)

Abstract:

Loading...

Culture, computer abuse, deontological evaluations, ethics, formalism, information security, organizational security, teleological evaluations, utilitarianism, collectivism, individualism

13.

Going Beyond Deterrence: A Middle-Range Theory of Motives and Controls for Insider Computer Abuse

Information Systems Research (ISR), Forthcoming
Number of pages: 64 Posted: 12 Apr 2022
Baylor University - Department of Information Systems, University of Kansas - School of Business, University of Central Florida, Virginia Polytechnic Institute & State University - Pamplin College of Business and Louisiana Tech University
Downloads 30 (629,464)

Abstract:

Loading...

Security; organizational security; information security; insider computer abuse (ICA); self-control theory; deterrence theory (DT); instrumental motives; expressive motives

14.

How Explanation Adequacy of Security Policy Changes Decreases Organizational Computer Abuse

Proceedings of the 9th Annual Special Interest Group on Human-Computer Interaction 2010 Pre-ICIS Workshop at the International Conference on System Sciences, St. Louis, Missouri, USA, December 12, paper 14, pp. 1-5
Number of pages: 7 Posted: 30 Jun 2013
University of Central Florida, University of Kansas - School of Business, Virginia Polytechnic Institute & State University - Pamplin College of Business and Louisiana Tech University - Department of Management and Information Systems
Downloads 18 (717,484)

Abstract:

Loading...

fairness theory, computer abuse, organizational trust, security training and awareness, explanation adequacy