John D'Arcy
John D'Arcy
Professor of MIS, University of Delaware
Verified email at udel.edu - Homepage
Title
Cited by
Cited by
Year
User awareness of security countermeasures and its impact on information systems misuse: A deterrence approach
J D'Arcy, A Hovav, D Galletta
Information systems research 20 (1), 79-98, 2009
12262009
A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings
J D'arcy, T Herath
European Journal of Information Systems 20 (6), 643-658, 2011
3812011
Understanding employee responses to stressful information security requirements: A coping perspective
J D'Arcy, T Herath, MK Shoss
Journal of management information systems 31 (2), 285-318, 2014
3062014
Trust and leadership in virtual teamwork: A media naturalness perspective
DM DeRosa, DA Hantula, N Kock, J D'Arcy
Human Resource Management: Published in Cooperation with the School of …, 2004
2892004
Applying an extended model of deterrence across cultures: An investigation of information systems misuse in the US and South Korea
A Hovav, J D’Arcy
Information & Management 49 (2), 99-110, 2012
2512012
The impact of denial‐of‐service attack announcements on the market value of firms
A Hovav, J D'Arcy
Risk Management and Insurance Review 6 (2), 97-121, 2003
2452003
Deterring internal information systems misuse
J D'Arcy, A Hovav
Communications of the ACM 50 (10), 113-117, 2007
1802007
Does one size fit all? Examining the differential effects of IS security countermeasures
J D’Arcy, A Hovav
Journal of business ethics 89 (1), 59, 2009
1752009
Employee misuse of information technology resources: Testing a contemporary deterrence model
J D'Arcy, S Devaraj
Decision Sciences 43 (6), 1091-1124, 2012
1602012
The dark side of information technology
M Tarafdar, J DArcy, O Turel, A Gupta
MIT Sloan Management Review 56 (2), 61, 2015
1342015
“Cargo Cult” science in traditional organization and information systems survey research: A case for using nontraditional methods of data collection, including Mechanical Turk …
PB Lowry, J D’Arcy, B Hammer, GD Moody
The Journal of Strategic Information Systems 25 (3), 232-240, 2016
1312016
The impact of virus attack announcements on the market value of firms.
A Hovav, J D'Arcy
WOSIS, 146-156, 2004
1112004
Reflecting on the “dark side” of information technology use
J D’Arcy, A Gupta, M Tarafdar, O Turel
Communications of the Association for Information Systems 35 (1), 5, 2014
1102014
Security culture and the employment relationship as drivers of employees’ security compliance
J D'Arcy, G Greene
Information Management & Computer Security, 2014
1062014
When do IT security investments matter? Accounting for the influence of institutional factors in the context of healthcare data breaches
CM Angst, ES Block, J D'arcy, K Kelley
Accounting for the Influence of Institutional Factors in the Context of …, 2017
1032017
Organizational information security policies: a review and research framework
WA Cram, JG Proudfoot, J D’arcy
European Journal of Information Systems 26 (6), 605-641, 2017
982017
Developing usable CAPTCHAs for blind users
J Holman, J Lazar, JH Feng, J D'Arcy
Proceedings of the 9th international ACM SIGACCESS conference on Computers …, 2007
912007
Modifying smartphone user locking behavior
D Van Bruggen, S Liu, M Kajzer, A Striegel, CR Crowell, J D'Arcy
Proceedings of the Ninth Symposium on Usable Privacy and Security, 1-14, 2013
852013
An exploratory investigation of message-person congruence in information security awareness campaigns
M Kajzer, J D'Arcy, CR Crowell, A Striegel, D Van Bruggen
Computers & security 43, 64-76, 2014
672014
Dual role of IT-assisted communication in patient care: a validated structure-process-outcome framework
CM Angst, S Devaraj, J D'Arcy
Journal of Management Information Systems 29 (2), 257-292, 2012
592012
The system can't perform the operation now. Try again later.
Articles 1–20