Anthony Vance

Brigham Young University - Department of Information Systems

510 Tanner Building

Marriott School

Provo, UT 84602

United States

SCHOLARLY PAPERS

13

DOWNLOADS
Rank 12,823

SSRN RANKINGS

Top 12,823

in Total Papers Downloads

7,348

SSRN CITATIONS
Rank 15,056

SSRN RANKINGS

Top 15,056

in Total Papers Citations

32

CROSSREF CITATIONS

69

Scholarly Papers (13)

1.

Overview and Guidance on Agile Development in Large Organizations

Communications of the Association for Information Systems, Vol. 29, No. 2, pp. 25-44, July 2011
Number of pages: 21 Posted: 17 Aug 2011 Last Revised: 07 May 2014
California State University, Fullerton - Mihaylo College of Business & Economics, University of Arizona - Department of Management Information Systems, Brigham Young University - Marriott School, University of Arizona - Department of Management Information Systems, Brigham Young University - Department of Information Systems, Virginia Tech - Pamplin College of Business and Brigham Young University - Department of Information Systems
Downloads 3,745 (5,838)
Citation 15

Abstract:

Loading...

agility, agile development, software development, life cycle, large organizations, waterfall method, extreme programming, Scrum, informal communication, interdependencies, coordination

2.

Increasing Accountability through the User Interface Design Artifacts: A New Approach to Addressing the Problem of Access-Policy Violations

MIS Quarterly, vol. 39(2), pp. 345–366.
Number of pages: 65 Posted: 14 Jan 2015 Last Revised: 08 Jan 2018
Brigham Young University - Department of Information Systems, Virginia Tech - Pamplin College of Business and Brigham Young University - Center for Statistical Consultation and Collaborative Research
Downloads 1,151 (36,430)
Citation 4

Abstract:

Loading...

Accountability theory, identifiability, expectation of evaluation, awareness of monitoring, social presence, factorial survey method, user-interface design, information security policy violations, unauthorized access, graphical vignettes, mediation, moderation, design science

3.

Inexpert Supervision: Field Evidence on Boards' Oversight of Cybersecurity

Number of pages: 60 Posted: 11 Jan 2022 Last Revised: 14 Aug 2024
Michelle Lowry, Anthony Vance and Marshall D. Vance
Virginia Tech, Brigham Young University - Department of Information Systems and Virginia Tech
Downloads 633 (81,928)
Citation 5

Abstract:

Loading...

corporate governance, boards of directors, board oversight, risk oversight, cybersecurity risk, agency theory, institutional theory, expertise, boundary condition, qualitative field study

4.

Explaining and Predicting the Impact of Branding Alliances and Website Quality on Initial Consumer Trust of E-Commerce Websites

Journal of Management Information Systems, Vol. 24(4), pp. 199–224 (doi: 10.2753/MIS0742-1222240408), 2008
Number of pages: 58 Posted: 21 Oct 2007 Last Revised: 01 Sep 2014
Virginia Tech - Pamplin College of Business, Brigham Young University - Department of Information Systems, University of Nevada, Las Vegas - College of Business, Georgia State University - Department of Computer Information Systems and University of Nebraska at Omaha - Department of Information Systems and Quantitative Analysis
Downloads 582 (91,108)

Abstract:

Loading...

Trust, Internet, brand image, brand awareness, branding alliance, e-commerce, associative network model of memory, familiarity, and information integration theory

5.

Using Accountability to Reduce Access Policy Violations in Information Systems

Journal of Management Information Systems, Vol. 29(4), pp. 263–289 (doi: 10.2753/MIS0742-1222290410)
Number of pages: 47 Posted: 11 Nov 2012 Last Revised: 22 Aug 2014
Brigham Young University - Department of Information Systems, Virginia Tech - Pamplin College of Business and Brigham Young University - Center for Statistical Consultation and Collaborative Research
Downloads 352 (164,654)
Citation 3

Abstract:

Loading...

accountability, accountability theory, access policy violations, factorial survey method, information security, identifiability, monitoring, evaluation, awareness, social presence

6.

Testing the Potential of RFID to Increase Supply-Chain Agility and to Mitigate the Bullwhip Effect

International Journal of Applied Logistics (IJAL), Forthcoming
Number of pages: 36 Posted: 01 Sep 2009
Brigham Young University - Department of Information Systems, Virginia Tech - Pamplin College of Business and Government of the United States of America - Institute of Technology
Downloads 211 (276,322)

Abstract:

Loading...

RFID, supply-chain agility, bullwhip effect, beer distribution game, e-commerce, interorganizational systems, information systems

7.

Using an Elaboration Likelihood Approach to Better Understand the Persuasiveness of Website Privacy Assurance Cues for Online Consumers

Journal of the American Society for Information Science and Technology, vol. 63(4), pp. 755-766 (DOI: 10.1002/asi.21705).
Number of pages: 41 Posted: 24 Oct 2011 Last Revised: 19 Jun 2014
Virginia Tech - Pamplin College of Business, University of Nevada, Las Vegas - College of Business, Brigham Young University - Department of Information Systems, University of Oklahoma - Michael F. Price College of Business, University of Arizona and California State University, East Bay
Downloads 174 (328,976)
Citation 3

Abstract:

Loading...

Elaboration Likelihood Model, argumentation, persuasion, cues, source credibility, website quality, privacy seals, assurance statements, privacy policy statements, brand image, risk

8.

How Moral Intensity and Impulsivity Moderate the Influence of Accountability on Access Policy Violations in Information Systems

Seventh Workshop on Information Security and Privacy 2013 (WISP 2013) at the 2013 International Conference on Information Systems (ICIS 2013), Milan, Italy, December 14
Number of pages: 8 Posted: 23 Nov 2014
David Eargle, Anthony Vance and Paul Benjamin Lowry
University of Pittsburgh - Management Information Systems, Brigham Young University - Department of Information Systems and Virginia Tech - Pamplin College of Business
Downloads 146 (381,285)

Abstract:

Loading...

9.

The Drivers in the Use of Online Whistle-Blowing Reporting Systems

Journal of Management Information Systems, Vol. 30(1), pp. 153-189 (doi: 10.2753/MIS0742-1222300105)
Number of pages: 61 Posted: 11 Nov 2012 Last Revised: 09 Sep 2013
Virginia Tech - Pamplin College of Business, University of Nevada, Las Vegas - College of Business, University of Pittsburgh and Director, Katz Doctoral Program and Brigham Young University - Department of Information Systems
Downloads 130 (417,560)
Citation 2

Abstract:

Loading...

Whistle-blowing, whistle-blowing reporting systems, organizational governance, organizational failure, computer abuse, anonymity, trust, IT artifacts, risk

10.

A New Approach to the Problem of Unauthorized Access: Raising Perceptions of Accountability through User Interface Design Features

The Dewald Roode Workshop in Information Systems Security 2011, Blacksburg, Virginia, USA, September 22–23, pp. 1–38
Number of pages: 39 Posted: 05 Jun 2013
Brigham Young University - Department of Information Systems, Brigham Young University - Department of Information Systems, Virginia Tech - Pamplin College of Business and Brigham Young University - Center for Statistical Consultation and Collaborative Research
Downloads 93 (531,246)

Abstract:

Loading...

unauthorized access, accountability, identifiability, evaluation, information security, user interface design

11.

Using Trust and Anonymity to Expand the Use of Anonymizing Systems That Improve Security Across Organizations and Nations

Security Journal, vol. 30(3), pp. 979-999, 2015
Number of pages: 42 Posted: 02 Aug 2015 Last Revised: 27 Aug 2017
Anthony Vance, Paul Benjamin Lowry and David Wilson
Brigham Young University - Department of Information Systems, Virginia Tech - Pamplin College of Business and University of Arizona - Department of Management Information Systems
Downloads 79 (586,687)
Citation 1

Abstract:

Loading...

Anonymizing systems, security infrastructure, security, anonymity, trust in IT, cyber security

12.

Reducing Unauthorized Access by Insiders Through End-User Design: Making Users Accountable

Proceedings of the 45th Annual Hawaii International Conference on System Sciences (HICSS 2012), Maui, Hawaii, USA, January 4-7, pp. 4623-4632 (best paper nomination)
Number of pages: 11 Posted: 30 Jun 2013
Brigham Young University - Department of Information Systems, Brigham Young University - Department of Information Systems and Virginia Tech - Pamplin College of Business
Downloads 52 (723,849)

Abstract:

Loading...

accountability, security, organizational security, least privilege, access, identifiability, evaluation, social presence

13.

Making Systems Users Accountable: Using Accountability to Deter Access Policy Violations

Roode Workshop on IS Security Research, Boston, MA, USA, October 8-9, 2010
Posted: 30 Aug 2010
Brigham Young University - Department of Information Systems, Brigham Young University - Department of Information Systems, Brigham Young University - Department of Information Systems and Virginia Tech - Pamplin College of Business

Abstract:

Loading...

accountability, identifiability, evaluation, IS security policies, computer abuse