Anthony Vance

Brigham Young University - Department of Information Systems

510 Tanner Building

Marriott School

Provo, UT 84602

United States

SCHOLARLY PAPERS

12

DOWNLOADS
Rank 12,374

SSRN RANKINGS

Top 12,374

in Total Papers Downloads

3,819

SSRN CITATIONS
Rank 12,660

SSRN RANKINGS

Top 12,660

in Total Papers Citations

1

CROSSREF CITATIONS

68

Scholarly Papers (12)

1.

Overview and Guidance on Agile Development in Large Organizations

Communications of the Association for Information Systems, Vol. 29, No. 2, pp. 25-44, July 2011
Number of pages: 21 Posted: 17 Aug 2011 Last Revised: 07 May 2014
California State University, Fullerton - Mihaylo College of Business & Economics, University of Arizona - Department of Management Information Systems, Brigham Young University - Marriott School, University of Arizona - Department of Management Information Systems, University of Nebraska at Omaha - Department of Information Systems and Quantitative Analysis, Virginia Polytechnic Institute & State University - Pamplin College of Business and Brigham Young University - Department of Information Systems
Downloads 1,860 (8,165)
Citation 14

Abstract:

Loading...

agility, agile development, software development, life cycle, large organizations, waterfall method, extreme programming, Scrum, informal communication, interdependencies, coordination

2.

Increasing Accountability through the User Interface Design Artifacts: A New Approach to Addressing the Problem of Access-Policy Violations

MIS Quarterly, vol. 39(2), pp. 345–366.
Number of pages: 65 Posted: 14 Jan 2015 Last Revised: 08 Jan 2018
Brigham Young University - Department of Information Systems, Virginia Polytechnic Institute & State University - Pamplin College of Business and Brigham Young University - Center for Statistical Consultation and Collaborative Research
Downloads 659 (38,659)

Abstract:

Loading...

Accountability theory, identifiability, expectation of evaluation, awareness of monitoring, social presence, factorial survey method, user-interface design, information security policy violations, unauthorized access, graphical vignettes, mediation, moderation, design science

3.

Explaining and Predicting the Impact of Branding Alliances and Website Quality on Initial Consumer Trust of E-Commerce Websites

Journal of Management Information Systems, Vol. 24(4), pp. 199–224 (doi: 10.2753/MIS0742-1222240408), 2008
Number of pages: 58 Posted: 21 Oct 2007 Last Revised: 01 Sep 2014
Virginia Polytechnic Institute & State University - Pamplin College of Business, Brigham Young University - Department of Information Systems, University of Nevada, Las Vegas - College of Business, Georgia State University - Department of Computer Information Systems and University of Nebraska at Omaha - Department of Information Systems and Quantitative Analysis
Downloads 526 (51,901)

Abstract:

Loading...

Trust, Internet, brand image, brand awareness, branding alliance, e-commerce, associative network model of memory, familiarity, and information integration theory

4.

Using Accountability to Reduce Access Policy Violations in Information Systems

Journal of Management Information Systems, Vol. 29(4), pp. 263–289 (doi: 10.2753/MIS0742-1222290410)
Number of pages: 47 Posted: 11 Nov 2012 Last Revised: 22 Aug 2014
Brigham Young University - Department of Information Systems, Virginia Polytechnic Institute & State University - Pamplin College of Business and Brigham Young University - Center for Statistical Consultation and Collaborative Research
Downloads 213 (142,962)

Abstract:

Loading...

accountability, accountability theory, access policy violations, factorial survey method, information security, identifiability, monitoring, evaluation, awareness, social presence

5.

Testing the Potential of RFID to Increase Supply-Chain Agility and to Mitigate the Bullwhip Effect

International Journal of Applied Logistics (IJAL), Forthcoming
Number of pages: 36 Posted: 01 Sep 2009
Brigham Young University - Department of Information Systems, Virginia Polytechnic Institute & State University - Pamplin College of Business and Government of the United States of America - Institute of Technology
Downloads 171 (174,765)

Abstract:

Loading...

RFID, supply-chain agility, bullwhip effect, beer distribution game, e-commerce, interorganizational systems, information systems

6.

Using an Elaboration Likelihood Approach to Better Understand the Persuasiveness of Website Privacy Assurance Cues for Online Consumers

Journal of the American Society for Information Science and Technology, vol. 63(4), pp. 755-766 (DOI: 10.1002/asi.21705).
Number of pages: 41 Posted: 24 Oct 2011 Last Revised: 19 Jun 2014
Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Nevada, Las Vegas - College of Business, Brigham Young University - Department of Information Systems, University of Oklahoma - Michael F. Price College of Business, University of Arizona and California State University, East Bay
Downloads 111 (246,415)

Abstract:

Loading...

Elaboration Likelihood Model, argumentation, persuasion, cues, source credibility, website quality, privacy seals, assurance statements, privacy policy statements, brand image, risk

7.

The Drivers in the Use of Online Whistle-Blowing Reporting Systems

Journal of Management Information Systems, Vol. 30(1), pp. 153-189 (doi: 10.2753/MIS0742-1222300105)
Number of pages: 61 Posted: 11 Nov 2012 Last Revised: 09 Sep 2013
Virginia Polytechnic Institute & State University - Pamplin College of Business, University of Nevada, Las Vegas - College of Business, University of Pittsburgh and Director, Katz Doctoral Program and Brigham Young University - Department of Information Systems
Downloads 99 (266,707)

Abstract:

Loading...

Whistle-blowing, whistle-blowing reporting systems, organizational governance, organizational failure, computer abuse, anonymity, trust, IT artifacts, risk

8.

How Moral Intensity and Impulsivity Moderate the Influence of Accountability on Access Policy Violations in Information Systems

Seventh Workshop on Information Security and Privacy 2013 (WISP 2013) at the 2013 International Conference on Information Systems (ICIS 2013), Milan, Italy, December 14
Number of pages: 8 Posted: 23 Nov 2014
David Eargle, Anthony Vance and Paul Benjamin Lowry
University of Pittsburgh - Management Information Systems, Brigham Young University - Department of Information Systems and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 58 (362,417)

Abstract:

Loading...

9.

Using Trust and Anonymity to Expand the Use of Anonymizing Systems That Improve Security Across Organizations and Nations

Security Journal, vol. 30(3), pp. 979-999, 2015
Number of pages: 42 Posted: 02 Aug 2015 Last Revised: 27 Aug 2017
Anthony Vance, Paul Benjamin Lowry and David Wilson
Brigham Young University - Department of Information Systems, Virginia Polytechnic Institute & State University - Pamplin College of Business and University of Arizona - Department of Management Information Systems
Downloads 49 (391,483)

Abstract:

Loading...

Anonymizing systems, security infrastructure, security, anonymity, trust in IT, cyber security

10.

A New Approach to the Problem of Unauthorized Access: Raising Perceptions of Accountability through User Interface Design Features

The Dewald Roode Workshop in Information Systems Security 2011, Blacksburg, Virginia, USA, September 22–23, pp. 1–38
Number of pages: 39 Posted: 05 Jun 2013
Brigham Young University - Department of Information Systems, Brigham Young University - Department of Information Systems, Virginia Polytechnic Institute & State University - Pamplin College of Business and Brigham Young University - Center for Statistical Consultation and Collaborative Research
Downloads 47 (398,367)

Abstract:

Loading...

unauthorized access, accountability, identifiability, evaluation, information security, user interface design

11.

Reducing Unauthorized Access by Insiders Through End-User Design: Making Users Accountable

Proceedings of the 45th Annual Hawaii International Conference on System Sciences (HICSS 2012), Maui, Hawaii, USA, January 4-7, pp. 4623-4632 (best paper nomination)
Number of pages: 11 Posted: 30 Jun 2013
Brigham Young University - Department of Information Systems, Brigham Young University - Department of Information Systems and Virginia Polytechnic Institute & State University - Pamplin College of Business
Downloads 26 (487,647)

Abstract:

Loading...

accountability, security, organizational security, least privilege, access, identifiability, evaluation, social presence

12.

Making Systems Users Accountable: Using Accountability to Deter Access Policy Violations

Roode Workshop on IS Security Research, Boston, MA, USA, October 8-9, 2010
Posted: 30 Aug 2010
Brigham Young University - Department of Information Systems, Brigham Young University - Department of Information Systems, Brigham Young University - Department of Information Systems and Virginia Polytechnic Institute & State University - Pamplin College of Business

Abstract:

Loading...

accountability, identifiability, evaluation, IS security policies, computer abuse