Login / Signup
Rebecca J. Bennett
ORCID
Publication Activity (10 Years)
Years Active: 2011-2021
Publications (10 Years): 5
Top Topics
Bdi Model
Face To Face Interaction
Information Security
Virtual Learning Community
Top Venues
Inf. Technol. People
HICSS
MIS Q.
Decis. Sci.
</>
Publications
</>
Jacob A. Young
,
James F. Courtney
,
Rebecca J. Bennett
,
Timothy Selwyn Ellis
,
Clay Posey
The impact of anonymous, two-way, computer-mediated communication on perceived whistleblower credibility.
Inf. Technol. People
34 (3) (2021)
A. J. Burns
,
Tom L. Roberts
,
Clay Posey
,
Rebecca J. Bennett
,
James F. Courtney
Intentions to Comply Versus Intentions to Protect: A VIE Theory Approach to Understanding the Influence of Insiders' Awareness of Organizational SETA Efforts.
Decis. Sci.
49 (6) (2018)
Paul Benjamin Lowry
,
Clay Posey
,
Rebecca J. Bennett
,
Tom L. Roberts
Leveraging fairness and reactance theories to deter reactive computer abuse following enhanced organisational information security policies: an empirical study of the influence of counterfactual reasoning and organisational trust.
Inf. Syst. J.
25 (3) (2015)
Clay Posey
,
Tom L. Roberts
,
Paul Benjamin Lowry
,
Rebecca J. Bennett
Multiple Indicators and Multiple Causes (MIMIC) Models as a Mixed-Modeling Technique: A Tutorial and an Annotated Example.
Commun. Assoc. Inf. Syst.
36 (2015)
A. J. Burns
,
Tom L. Roberts
,
Clay Posey
,
Rebecca J. Bennett
,
James F. Courtney
Assessing the Role of Security Education, Training, and Awareness on Insiders' Security-Related Behavior: An Expectancy Theory Approach.
HICSS
(2015)
Clay Posey
,
Tom L. Roberts
,
Paul Benjamin Lowry
,
Rebecca J. Bennett
,
James F. Courtney
Insiders' Protection of Organizational Information Assets: Development of a Systematics-Based Taxonomy and Theory of Diversity for Protection-Motivated Behaviors.
MIS Q.
37 (4) (2013)
Clay Posey
,
Rebecca J. Bennett
,
Tom L. Roberts
Understanding the mindset of the abusive insider: An examination of insiders' causal reasoning following internal security changes.
Comput. Secur.
30 (6-7) (2011)