Journal Publications

  1. Cram, A. and D’Arcy, J. (Forthcoming). “Barking Up the Wrong Tree: Reconsidering Policy Compliance as a Dependent Variable within Behavioral Cybersecurity Research,” Information Systems Frontiers.
  2. Cram, A., D’Arcy, J. and Benlian, A. (Conditionally Accepted). “The Only Thing We Have to Fear Is Fear Itself: The Influence of Instability in the Cybersecurity Fear Control Process,” MIS Quarterly.
  3. Cram, A., D’Arcy, J. and Benlian, A. (2024). “Time Will Tell: A Case for an Idiographic Approach to Behavioral Cybersecurity Research,” MIS Quarterly, 48(1), 95-136.
  4. Herath, T., D’Arcy, J., Herath, H. and Yuan, S. (2024) “Role of Need to Belong, Social Influences, and Perceived Risks in Social Networking Behaviors,” International Journal of Digital Society, 15(1), 1916-1924.
  5. Cram, A. and D’Arcy, J. (2023). “What a Waste of Time: An Examination of Cybersecurity Legitimacy,” Information Systems Journal, 33(6), 1396-1422.
  6. Singh, T., Johnston, A.C., D’Arcy, J. and Harms, P.D. (2023). “Stress in the Cybersecurity Profession: An Systematic Review of Related Literature and Opportunities for Future Research,” Organizational Cybersecurity Journal: Practice, Process, and People, 3(2), 100-126.
  7. D’Arcy, J. and Basoglu, A. (2022). “The Influences of Public and Institutional Pressure on Firms’ Cybersecurity Disclosures,” Journal of the Association for Information Systems, 23(3), 779-805.
  8. Wall, J.D., Palvia, P. and D’Arcy, J. (2022). “Theorizing the Behavioral Effects of Control Complementarity in Security Control Platforms,” Information Systems Frontiers, 24(2), 637-658.
  9. Cianci, A.M., Convery, A.M., D’Arcy, J. and Tsakumis, G.T. (2021). “I Expected More From You: Navigating Client Trust Violations,” California Management Review Insights, December 13.
  10. Cram, A., Proudfoot, J. and D’Arcy, J. (2021). “When Enough is Enough: Investigating the Antecedents and Consequences of Information Security Fatigue,” Information Systems Journal, 31(4), 521-549.
  11. Blackwood-Brown, C., Levy, Y. and D’Arcy, J. (2021). “Cybersecurity Awareness and Skills of Senior Citizens: A Motivation Perspective,” Journal of Computer Information Systems, 61(3), 195-206.
  12. D’Arcy, J., Adjerid, I., Angst, C. and Glavas, A. (2020). “Too Good to Be True: Firm Social Reputation and the Risk of Data Breach,” Information Systems Research, 31(4), 1200-1223.
  13. Cram, A., Proudfoot, J. and D’Arcy, J. (2020). “Maximizing Employee Compliance with Cybersecurity Policies,” MIS Quarterly Executive, 19(3), 183-198.
  14. Herath, T., Herath, H. and D’Arcy, J. (2020). “Diffusion of Information Security Solutions in Organizations: An Integrative Lens Based on Information Diffusion and Technology-Organization-Environment Framework,” The DATABASE for Advances in Information Systems, 51(2), 12-35.
  15. Cram, A., D’Arcy, J. and Proudfoot, J. (2019). “Seeing the Forest and the Trees: A Meta-Analysis of the Antecedents of Information Security Policy Compliance,” MIS Quarterly, 43(2), 525-554.
  16. D’Arcy, J. and Lowry, P.B. (2019). “Cognitive-Affective Drivers of Employees’ Daily Compliance with Information Security Policies: A Multilevel, Longitudinal Study,” Information Systems Journal, 29(1), 43-69.
  17. D’Arcy, J. and Teh, P.-L. (2019). “Predicting Employee Information Security Policy Compliance on a Daily Basis: The Interplay of Security-Related Stress, Emotions, and Neutralization,” Information & Management, 56(7), 103151.
  18. Turel, O., Matt, C., Trenz, M, Cheung, C.M.K., D’Arcy, J., Qahri-Saremi, H. and Tarafdar, M. (2019). “Panel Report: The Dark Side of the Digitization of the Individual,” Internet Research, 29(2), 274-288.
  19. Herath, T., Yim, M.-S., D’Arcy, J., Kichan, N. and Raghav, H.R. (2018). “Examining Employees Security Violations: Moral Disengagement and Its Environmental Influences,” Information Technology & People, 31(6), 1135-1162.
  20. D’Arcy, J., Herath, T., Yim, M.-S., Kichan, N. and Raghav, H.R. (2018). “Employee Moral Disengagement in Response to Stressful Information Security Requirements: A Methodological Replication of a Coping-Based Model,” AIS Transactions on Replication Research, 4(8), 1-17.
  21. Angst, C., Block, E., D’Arcy, J. and Kelley, K. (2017). “When Do IT Security Investments Matter? Accounting for the Influence of Institutional Factors in the Context of Healthcare Data Breaches,” MIS Quarterly, 41(3), 893-916.
  22. Cram, A., Proudfoot, J. and D’Arcy, J. (2017). “Organizational Information Security Policies: A Review and Research Framework,” European Journal of Information Systems, 26(6), 605-641.
  23. Lowry, P.B., D’Arcy, J., Hammer, B. and Moody, G. (2016). “Cargo Cult Science in Traditional Organization and Information Systems Survey Research: A Case for Nontraditional Methods of Data Collection, Including Mechanical Turk and Online Panels,” Journal of Strategic Information Systems, 25(3), 232-240.
  24. Cram, A. and D’Arcy, J. (2016). “Teaching Information Security in Business Schools: A Proposal to Balance Technical and Managerial Content,” Communications of the Association for Information Systems, 39(3), 32-51.
  25. Tarafdar, M., D’Arcy, J., Gupta, A. and Turel, O. (2015). “Is Information Technology Zapping Your Organization? Taking on the Dark Side of Information Technology Use,” MIT Sloan Management Review, 56(2), 61-70.
  26. Teh, P.-L., Ahmed, P.K. and D’Arcy, J. (2015). “What Drives Information Security Policy Violations Among Banking Employees? Insights from Neutralization and Social Exchange Theory,” Journal of Global Information Management, 23(1), 44-64.
  27. D’Arcy, J., Herath, T. and Shoss, M. (2014). “Understanding Employee Responses to Stressful Information Security Requirements: A Coping Perspective,” Journal of Management Information Systems, 31(2), 291-325. Online Appendix
  28. D’Arcy, J. and Greene, G. (2014). “Security Culture and the Employment Relationship as Drivers of Employees’ Security Compliance,” Information Management & Computer Security, 22(5), 474-489.
  29. D’Arcy, J., Gupta, A., Tarafdar, M. and Turel, O. (2014). “Reflecting on the ‘Dark Side’ of Information Technology Use,” Communications of the Association for Information Systems, 35(5), 109-118.
  30. Kajzer, M., D’Arcy, J., Crowell, C., Striegel, A. and Van Bruggen, D. (2014). “An Exploratory Investigation of Message-Person Congruence in Information Security Awareness Campaigns,” Computers & Security, 43, 64-76.
  31. Angst, C., Devaraj, S. and D’Arcy, J. (2012). “Dual Role of IT-Assisted Communication in Patient Care: A Validated Structure-Process-Outcome Framework,” Journal of Management Information Systems, 29(2), 255-291.
  32. D’Arcy, J. and Devaraj, S. (2012). “Employee Misuse of Information Technology Resources: Testing a Contemporary Deterrence Model,” Decision Sciences, 43(6), 1091-1124. (Best Paper Runner Up)
  33. Vaidyanathan, G., Devaraj, S. and D’Arcy, J. (2012). “Does Security Impact E-Procurement Performance? Testing a Model of Direct and Moderated Effects,” Decision Sciences, 43(3), 437-458.
  34. Hovav, A. and D’Arcy, J. (2012). “Applying an Extended Model of Deterrence Across Cultures: An Investigation of Information Systems Misuse in the U.S. and South Korea,” Information & Management, 49(2), 99-110.
  35. D’Arcy, J. and Herath, T. (2011). “A Review and Analysis of Deterrence Theory in the IS Security Literaure: Making Sense of the Disparate Findings,” European Journal of Information Systems, 20(6), 643-658.
  36. D’Arcy, J., Hovav, A. and Galletta, D. (2009). “User Awareness of Security Countermeaures and Its Impact on Information Systems Misuse: A Deterrence Perspective,” Information Systems Research, 20(1), 79-98. (Emerald Citations of Excellence Award)
  37. D’Arcy, J. and Hovav. A. (2009). “Does One Size Fit All? Examining the Differential Effects of IS Security Countermeasures,” Journal of Business Ethics, 89(1), 59-71.
  38. Chapple, M.J., D’Arcy, J., and Striegel, A. (2009). “An Analyis of Firewall Rulebase (Mis)Management Practices,” Journal of the Information Systems Security Association, Feb., 12-18.
  39. D’Arcy, J. and Hovav, A. (2007). “Deterring Internal Information Systems Misuse,” Communications of the ACM, 50(10), 113-117.
  40. D’Arcy, J. and Hovav, A. (2007). “Towards a Best Fit Between Organizational Security Countermeasures and Information Systems Misuse Behaviors,” Journal of Information System Security, 3(2), 1-30.
  41. Schuff, D., Turetken, O., D’Arcy, J. and Croson, D. (2007). “Managing E-Mail Overload: Present Solutions and Future Challenges,” IEEE Computer, 40(2), 31-36.
  42. Schuff, D., Turetken, O. and D’Arcy, J.. (2006). “A Multi-Attribute, Multi-Weight Clustering Approach to Managing E-Mail Overload,” Decision Support Systems, 42(3), 1350-1365.
  43. Hovav, A. and D’Arcy, J. (2005). “Capital Market Reaction to Defective IT Products: The Case of Computer Viruses,” Computers & Security, 24(5), 409-424.
  44. Hovav, A. and D’Arcy, J. (2004). “The Impact of Virus Attack Announcements on the Market Value of Firms,” Information Systems Security, 13(3), 32-40.
  45. DeRosa, D., Hantula, D.A., Kock, N. and D’Arcy, J. (2004). “Trust and Leadership in Virtual Teamwork: A Media Naturalness Perspective,” Human Resource Management, 43(2/3), 219-232.
  46. Hovav, A. and D’Arcy, J. (2003). “The Impact of Denial-of-Service Attack Announcments on the Market Value of Firms,” Risk Management and Insurance Review, 6(2), 97-121. (Best Paper Award)
  47. Kock, N. and D’Arcy, J. (2002). “Resolving the E-Collaboration Paradox: The Competing Influences of Media Naturalness and Compensatory Adaptation,” Information Management and Consulting, 17(4), 72-78.