Clay Posey

University of Central Florida

4000 Central Florida Blvd

Orlando, FL 32816-1400

United States

SCHOLARLY PAPERS

14

DOWNLOADS
Rank 19,442

SSRN RANKINGS

Top 19,442

in Total Papers Downloads

2,389

CITATIONS
Rank 26,982

SSRN RANKINGS

Top 26,982

in Total Papers Citations

9

Scholarly Papers (14)

1.

Multiple Indicators and Multiple Causes (MIMIC) Models as a Mixed-Modelling Technique: A Tutorial and an Annotated Example

Communications of the Association for Information Systems, vol. 36(11)
Number of pages: 32 Posted: 17 Nov 2014 Last Revised: 05 Apr 2015
University of Central Florida, University of Kansas - School of Business, Virginia Polytechnic Institute & State University - Pamplin College of Business and Louisiana Tech University - Department of Management and Information Systems
Downloads 766 (30,776)

Abstract:

Loading...

Methodology, Formative Construct Validation, MIMIC Modelling, Covariance-based SEM, Protection-Motivated Behaviors

2.

Insiders’ Protection of Organizational Information Assets: Development of a Systematics-Based Taxonomy and Theory of Diversity for Protection-Motivated Behaviors

MIS Quarterly, Vol. 37(4), pp. 1189-1210
Number of pages: 59 Posted: 11 Nov 2012 Last Revised: 09 Sep 2013
University of Central Florida, University of Kansas - School of Business, Virginia Polytechnic Institute & State University - Pamplin College of Business, Louisiana Tech University - Department of Management and Information Systems and Independent
Downloads 379 (75,601)

Abstract:

Loading...

Protection-motivated behaviors, behavioral information security, systematics, theory of diversity, multidimensional scaling, cluster analysis, taxonomy

3.

When Computer Monitoring Backfires: Invasion of Privacy and Organizational Injustice as Precursors to Computer Abuse

Journal of Information System Security, Vol. 7, No. 1, pp. 24-47, 2011
Number of pages: 30 Posted: 13 Nov 2011 Last Revised: 30 Jun 2013
University of Central Florida, Louisiana Tech University - Department of Management and Information Systems, University of Kansas - School of Business and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 370 (77,751)
Citation 1

Abstract:

Loading...

Reactance theory, fairness theory, computer monitoring, computer abuse, privacy invasion, procedural justice, distributive justice, antisocial behavior

4.

Motivating the Insider to Protect Organizational Information Assets: Evidence from Protection Motivation Theory and Rival Explanations

The Dewald Roode Workshop in Information Systems Security 2011, Blacksburg, Virginia, USA, September 22–23, pp. 1–51
Number of pages: 52 Posted: 05 Jun 2013
University of Central Florida, University of Kansas - School of Business, Virginia Polytechnic Institute & State University - Pamplin College of Business, Independent and Louisiana Tech University - Department of Management and Information Systems
Downloads 274 (109,009)
Citation 1

Abstract:

Loading...

Protection-motivated behaviors, protection motivation theory, threat appraisal, coping appraisal, MIMIC model, job satisfaction, management support, structural equation modeling

5.

The Impact of Organizational Commitment on Insiders’ Motivation to Protect Organizational Information Assets

Journal of Management Information Systems, vol. 32(4), pp. 179–214, 2015
Number of pages: 61 Posted: 08 Aug 2015 Last Revised: 09 May 2016
University of Central Florida, University of Kansas - School of Business and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 175 (167,498)

Abstract:

Loading...

Protection-motivated behaviors, protection motivation theory, threat appraisal, coping appraisal, MIMIC model, security, organizational commitment, structural equation modeling

6.

Proposing the Online Community Self-Disclosure Model: The Case of Working Professionals in France and the UK Who Use Online Communities

European Journal of Information Systems (EJIS), Vol. 19, No. 2, pp. 181-195 (doi:10.1057/ejis.2010.15), 2010
Number of pages: 63 Posted: 08 Nov 2009 Last Revised: 05 Sep 2014
University of Central Florida, Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Kansas - School of Business and Louisiana Tech University - Department of Management and Information Systems
Downloads 97 (264,569)
Citation 6

Abstract:

Loading...

Self-disclosure, social influence, trust, privacy, reciprocity, collectivism, individualism, culture

7.

Bridging the Divide: A Qualitative Comparison of Information Security Thought Patterns between Information Security Professionals and Ordinary Organizational Insiders

Information & Management, vol. 51(5), pp. 551–567
Number of pages: 41 Posted: 01 Apr 2014 Last Revised: 08 Jun 2014
University of Central Florida, University of Kansas - School of Business, Virginia Polytechnic Institute & State University - Pamplin College of Business and University of Central Florida
Downloads 82 (294,025)

Abstract:

Loading...

behavioral information security; risk assessment; qualitative analysis; organizational insiders; security professionals; protection motivation theory

8.

Leveraging Fairness and Reactance Theories to Deter Reactive Computer Abuse Following Enhanced Organisational Information Security Policies: An Empirical Study of the Influence of Counterfactual Reasoning and Organisational Trust

Information Systems Journal, vol. 25(3), pp. 193–230 (doi.org/10.1111/isj.12063)
Number of pages: 60 Posted: 06 Jan 2015 Last Revised: 04 Aug 2015
Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Central Florida, Louisiana Tech University - Department of Management and Information Systems and University of Kansas - School of Business
Downloads 69 (324,566)

Abstract:

Loading...

Fairness theory (FT), reactance theory (RT), deterrence theory (DT), counterfactual reasoning, reactive computer abuse (CA), explanation adequacy (EA), organisational trust, security education, training, and awareness (SETA), deterrence, security, organisation communication

9.

Insiders' Protection of Organizational Information Assets: A Multidimensional Scaling Study of Protection-Motivated Behaviors

Roode Workshop on IS Security Research, Boston, MA, USA, October 8-9, 2010
Number of pages: 51 Posted: 30 Aug 2010 Last Revised: 06 Sep 2014
University of Central Florida, University of Kansas - School of Business, Virginia Polytechnic Institute & State University - Pamplin College of Business, Louisiana Tech University - Department of Management and Information Systems and Independent
Downloads 52 (373,132)
Citation 1

Abstract:

Loading...

Protection-motivated behaviors, behavioral information security, information assurance, multidimensional scaling, cluster analysis, typology formation

10.

Is Your Banker Leaking Your Personal Information? The Roles of Ethics and Individual-Level Cultural Characteristics in Predicting Organizational Computer Abuse

Journal of Business Ethics, vol. 121(3), pp. 385–401
Number of pages: 46 Posted: 04 Apr 2013 Last Revised: 08 Jun 2014
Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Central Florida, University of Kansas - School of Business and Louisiana Tech University - Department of Management and Information Systems
Downloads 40 (414,919)

Abstract:

Loading...

Culture, computer abuse, deontological evaluations, ethics, formalism, information security, organizational security, teleological evaluations, utilitarianism, collectivism, individualism

11.

Examining the Relationship of Organizational Insiders' Psychological Capital with Information Security Threat and Coping Appraisals

Computers in Human Behavior (CHB), Vol. 68 (March), pp. 190-209
Number of pages: 52 Posted: 17 Nov 2016 Last Revised: 27 Feb 2017
University of Texas at Tyler, University of Central Florida, University of Kansas - School of Business and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 39 (418,683)

Abstract:

Loading...

Information Security, Psychological Capital (PsyCap), Protection Motivation Theory (PMT), Positive Psychology, Organizational Insiders

12.

The Adaptive Roles of Positive and Negative Emotions in Organizational Insiders’ Engagement in Security-Based Precaution Taking

Information Systems Research (ISR), Forthcoming
Number of pages: 46 Posted: 21 Mar 2019
University of Texas at Tyler, University of Kansas - School of Business, University of Central Florida and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 28 (466,311)

Abstract:

Loading...

Information security (InfoSec); organizational security; emotions; precaution taking; broaden-and-build theory (BBT); positive psychology; psychological distancing; psychological capital (PsyCap)

13.

How Explanation Adequacy of Security Policy Changes Decreases Organizational Computer Abuse

Proceedings of the 9th Annual Special Interest Group on Human-Computer Interaction 2010 Pre-ICIS Workshop at the International Conference on System Sciences, St. Louis, Missouri, USA, December 12, paper 14, pp. 1-5
Number of pages: 7 Posted: 30 Jun 2013
University of Central Florida, University of Kansas - School of Business, Virginia Polytechnic Institute & State University - Pamplin College of Business and Louisiana Tech University - Department of Management and Information Systems
Downloads 17 (526,770)

Abstract:

Loading...

fairness theory, computer abuse, organizational trust, security training and awareness, explanation adequacy

14.

Taking Stock of Organisations’ Protection of Privacy: Categorising and Assessing Threats to Personally Identifiable Information in the USA

European Journal of Information Systems, Vol. 26, Issue 6, 2017
Number of pages: 20 Posted: 24 Aug 2018
University of Central Florida, Comsats University Islamabad, Washington State University - Department of Management, Information Systems, and Entrepreneurship (MISE) and University of Texas at Tyler
Downloads 1 (633,216)
  • Add to Cart

Abstract:

Loading...

personally identifiable information (PII), breach analysis, taxonomy development, privacy, confidentiality