Login / Signup
Clay Posey
ORCID
Publication Activity (10 Years)
Years Active: 2007-2024
Publications (10 Years): 19
Top Topics
Intrusion Detection
Student Interaction
Security Policies
Information Security
Top Venues
HICSS
Inf. Syst. Frontiers
Inf. Syst. Res.
HCI (17)
</>
Publications
</>
Yaojie Li
,
Clay Posey
,
Thomas F. Stafford
Bureaucracies in information securing: Transitioning from iron cages to iron shields.
Inf. Organ.
34 (3) (2024)
Ryan M. Schuetzler
,
Justin Scott Giboney
,
Taylor M. Wells
,
Benjamin Richardson
,
Tom Meservy
,
Cole Sutton
,
Clay Posey
,
Jacob Steffen
,
Amanda Lee Hughes
Student Interaction with Generative AI: An Exploration of an Emergent Information-Search Process.
HICSS
(2024)
Clay Posey
,
Mitchell McCoard
,
A. J. Burns
,
Tom L. Roberts
Routine, Situational, and Exceptional Security Violations in Organizations.
AMCIS
(2024)
A. J. Burns
,
Tom L. Roberts
,
Clay Posey
,
Paul Benjamin Lowry
,
Bryan Fuller
Going Beyond Deterrence: A Middle-Range Theory of Motives and Controls for Insider Computer Abuse.
Inf. Syst. Res.
34 (1) (2023)
Jacob A. Young
,
James F. Courtney
,
Rebecca J. Bennett
,
Timothy Selwyn Ellis
,
Clay Posey
The impact of anonymous, two-way, computer-mediated communication on perceived whistleblower credibility.
Inf. Technol. People
34 (3) (2021)
A. J. Burns
,
Clay Posey
,
Tom L. Roberts
Insiders' Adaptations to Security-Based Demands in the Workplace: An Examination of Security Behavioral Complexity.
Inf. Syst. Frontiers
23 (2) (2021)
Matthew Canham
,
Clay Posey
,
Patricia S. Bockelman
Confronting Information Security's Elephant, the Unintentional Insider Threat.
HCI (17)
(2020)
Clay Posey
,
Robert Folger
An exploratory examination of organizational insiders' descriptive and normative perceptions of cyber-relevant rights and responsibilities.
Comput. Secur.
99 (2020)
A. J. Burns
,
Tom L. Roberts
,
Clay Posey
,
Paul Benjamin Lowry
The Adaptive Roles of Positive and Negative Emotions in Organizational Insiders' Security-Based Precaution Taking.
Inf. Syst. Res.
30 (4) (2019)
A. J. Burns
,
Tom L. Roberts
,
Clay Posey
,
Rebecca J. Bennett
,
James F. Courtney
Intentions to Comply Versus Intentions to Protect: A VIE Theory Approach to Understanding the Influence of Insiders' Awareness of Organizational SETA Efforts.
Decis. Sci.
49 (6) (2018)
A. J. Burns
,
Clay Posey
,
James F. Courtney
,
Tom L. Roberts
,
Prabhashi Nanayakkara
Organizational information security as a complex adaptive system: insights from three agent-based models.
Inf. Syst. Frontiers
19 (3) (2017)
A. J. Burns
,
Clay Posey
,
Tom L. Roberts
,
Paul Benjamin Lowry
Examining the relationship of organizational insiders' psychological capital with information security threat and coping appraisals.
Comput. Hum. Behav.
68 (2017)
Clay Posey
,
Uzma Raja
,
Robert E. Crossler
,
A. J. Burns
Taking stock of organisations' protection of privacy: categorising and assessing threats to personally identifiable information in the USA.
Eur. J. Inf. Syst.
26 (6) (2017)
Robert E. Crossler
,
Clay Posey
Robbing Peter to Pay Paul: Surrendering Privacy for Security's Sake in an Identity Ecosystem.
J. Assoc. Inf. Syst.
18 (7) (2017)
John R. Drake
,
Dianne J. Hall
,
J. Bret Becton
,
Clay Posey
Job Applicants' Information Privacy Protection Responses: Using Social Media for Candidate Screening.
AIS Trans. Hum. Comput. Interact.
8 (4) (2016)
Paul Benjamin Lowry
,
Clay Posey
,
Rebecca J. Bennett
,
Tom L. Roberts
Leveraging fairness and reactance theories to deter reactive computer abuse following enhanced organisational information security policies: an empirical study of the influence of counterfactual reasoning and organisational trust.
Inf. Syst. J.
25 (3) (2015)
Clay Posey
,
Tom L. Roberts
,
Paul Benjamin Lowry
,
Rebecca J. Bennett
Multiple Indicators and Multiple Causes (MIMIC) Models as a Mixed-Modeling Technique: A Tutorial and an Annotated Example.
Commun. Assoc. Inf. Syst.
36 (2015)
A. J. Burns
,
Tom L. Roberts
,
Clay Posey
,
Rebecca J. Bennett
,
James F. Courtney
Assessing the Role of Security Education, Training, and Awareness on Insiders' Security-Related Behavior: An Expectancy Theory Approach.
HICSS
(2015)
Clay Posey
,
Tom L. Roberts
,
Paul Benjamin Lowry
The Impact of Organizational Commitment on Insiders' Motivation to Protect Organizational Information Assets.
J. Manag. Inf. Syst.
32 (4) (2015)
Clay Posey
,
Tom L. Roberts
,
Paul Benjamin Lowry
,
Ross T. Hightower
Bridging the divide: A qualitative comparison of information security thought patterns between information security professionals and ordinary organizational insiders.
Inf. Manag.
51 (5) (2014)
Clay Posey
,
Tom L. Roberts
,
Paul Benjamin Lowry
,
Rebecca J. Bennett
,
James F. Courtney
Insiders' Protection of Organizational Information Assets: Development of a Systematics-Based Taxonomy and Theory of Diversity for Protection-Motivated Behaviors.
MIS Q.
37 (4) (2013)
Ronald T. Cenfetelli
,
Geneviève Bassellier
,
Clay Posey
The analysis of formative measurement in IS research: choosing between component-and covariance-based techniques.
Data Base
44 (4) (2013)
Clay Posey
,
Rebecca J. Bennett
,
Tom L. Roberts
Understanding the mindset of the abusive insider: An examination of insiders' causal reasoning following internal security changes.
Comput. Secur.
30 (6-7) (2011)
Clay Posey
,
Paul Benjamin Lowry
,
Tom L. Roberts
,
T. Selwyn Ellis
Proposing the online community self-disclosure model: the case of working professionals in France and the U.K. who use online communities.
Eur. J. Inf. Syst.
19 (2) (2010)
Clay Posey
,
Abdullahel Bari
Information Sharing and Supply Chain Performance: Understanding Complexity, Compatibility, and Processing.
Int. J. Inf. Syst. Supply Chain Manag.
2 (3) (2009)
Clay Posey
,
Yan Liu
,
Bryan Fuller
A Meta-Analytic Review of More than a Decade of Research on General Computer Self-Efficacy: Research in Progress.
AMCIS
(2008)
Clay Posey
,
Selwyn Ellis
Understanding Self-Disclosure in Electronic Communities: An Exploratory Model of Privacy Risk Beliefs, Reciprocity, and Trust.
AMCIS
(2007)