John D'Arcy
University of Delaware
H-index: 35
North America-United States
Top articles of John D'Arcy
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Using Large Language Models to Improve Business Research | Available at SSRN 4803723 | Yutong Zhang Yiwen Gao John D'Arcy Jason Bennett Thatcher | 2024/4 |
Chief Information Officers (CIOs) Joining Outside Boards of Directors: Impact on Their Home Firms’ Cybersecurity | Available at SSRN 4750083 | Justin Short John D'Arcy Yili Hong | 2024/3/1 |
‘What a waste of time’: An examination of cybersecurity legitimacy | Information Systems Journal | W Alec Cram John D'Arcy | 2023/11 |
Barking up the wrong tree? Reconsidering policy compliance as a dependent variable within behavioral cybersecurity research | W Alec Cram John D'Arcy | 2023/1/3 | |
A DEVOPS PERSPECTIVE: THE IMPACT OF ROLE TRANSITIONS ON SOFTWARE SECURITY CONTINUITY | Hwee-Joo Kam John D’Arcy | 2023 | |
Stress in the cybersecurity profession: a systematic review of related literature and opportunities for future research | Tripti Singh Allen C Johnston John D'Arcy Peter D Harms | 2023/12/11 | |
Trading well-being for ISP compliance: An investigation of the positive and negative effects of SETA programs | Jalal Sarabadani Robert E Crossler John D'Arcy | 2022 | |
The influences of public and institutional pressure on firms’ cybersecurity disclosures | Journal of the Association for Information Systems | John D'Arcy Asli Basoglu | 2022 |
Theorizing the behavioral effects of control complementarity in security control portfolios | Information Systems Frontiers | Jeffrey D Wall Prashant Palvia John D’Arcy | 2022/4 |
A role theory perspective: Will shifting left become a pain for application developers? | Hwee-Joo Kam John D'Arcy | 2022 | |
“I Expected More From You”: Navigating Client Trust Violations | California Management Review Insights | Anna M Cianci Amanda M Convery John D’Arcy George Tsakumis | 2021/12/13 |
When enough is enough: Investigating the antecedents and consequences of information security fatigue | Information Systems Journal | W Alec Cram Jeffrey G Proudfoot John D'Arcy | 2021/7 |
Cybersecurity awareness and skills of senior citizens: a motivation perspective | Journal of Computer Information Systems | Carlene Blackwood-Brown Yair Levy John D’Arcy | 2021/5/4 |
Too good to be true: Firm social performance and the risk of data breach | Information Systems Research | John D’Arcy Idris Adjerid Corey M Angst Ante Glavas | 2020/12 |
Maximizing Employee Compliance with Cybersecurity Policies. | MIS Quarterly Executive | W Alec Cram Jeffrey G Proudfoot John D'Arcy | 2020/9/1 |
Organizational adoption of information security solutions: An integrative lens based on innovation adoption and the technology-organization-environment framework | ACM SIGMIS Database: the DATABASE for Advances in Information Systems | Tejaswini C Herath Hemantha SB Herath John D'Arcy | 2020/5/13 |