Virginia Tech® home

Research

The Pamplin College of Business’s Security, Privacy, and Trust group brings together the knowledge and expertise of our faculty and students who engage in the latest research and findings in security, privacy, and trust across multiple disciplines and areas. 

Research Articles

  • Elite Journal Going Beyond Deterrence: A Middle-Range Theory of Motives and Controls for Insider Computer Abuse
    • Lowry, Paul Benjamin
    • Burns, A. J.
    • Roberts, Tom L.
    • Posey, Clay
    • Fuller, Bryan
    Information Systems Research
  • Elite Journal Examining the Differential Effectiveness of Fear Appeals in Information Security Management Using Two-Stage Meta-Analysis
    • Lowry, Paul Benjamin
    • Moody, Gregory D., Parameswaran, Srikanth
    • Brown, Nicholas James
    Journal of Management Information Systems
  • Tell me a story: The effects that narratives exert on meaningful-engagement outcomes in antiphishing training
    • Lowry, Paul Benjamin
    • Hull, David Michael
    • Schuetz, Sebastian Walter
    Computers & Security
  • Balancing the Commitment to the Common Good and the Protection of Personal Privacy: Consumer Adoption of Sustainable, Smart Connected Cars
    • Lowry, Paul Benjamin
    • Choi, Daeeun Daniel
    Information & Manageent
  • Elite Journal How Mergers and Acquisitions Increase Data Breaches: A Complexity Perspective
    • Liang, Huigang
    • Srinivas, Santhosh
    • Xue, Yajiong
    MIS Quarterly
  • Elite Journal Do Security Fear Appeals Work When They Interrupt Tasks? A Multi-Method Examination of Password Strength
    • Vance, Anthony
    • Eargle, D.
    • Eggett, D.
    • Straub, D. W.
    • Ouimet, K.
    MIS Quarterly
  • Elite Journal Privacy Please: Power Distance and People’s Responses to Data Breaches Across Countries.
    • Madan, Shilpa
    • Savani, Krishna
    • Katskieas, Constantine S.
    Journal of International Business Studies
  • Elite Journal Impact of Customer Compensation Strategies on Outcomes and The Mediating Role of Justice Perceptions: A Longitudinal Study of Target's Data Breach
    • Venkatesh, Viswanath
    • Hoehle, Hartmut
    • Brown, Susan A.
    • Tepper, Bennett J.
    • Kude, Thomas
    MIS Quarterly
  • A Longitudinal Study on Improving Employee Information Protective Knowledge and Behaviors
    • France Belanger
    • Maier, Jurgen
    • Maier, Michaela
    Computers & Security
  • Critical Protection for the Network of Persons.
    • Hiller, Janine S.
    • Brantly, Aaron F.
    • Berger-Walliser, Gerlinde
    The Journal of Law and Social Change
  • Elite Journal Privacy Regulations and Barriers to Public Health
    • Adjerid, Idris
    • Buckman, Joseph
    • Tucker, Catherine E.
    Management Science
  • Cybersecurity in Supply Chains: Quantifying Risk
    • Baker, Wade
    • Deane, Jason
    • Rees, Loren
    Journal of Computer Information Systems
  • Taking a Seat at the Table: The Quest for CISO Legitimacy
    • Lowry, Michelle
    • Sahin, Zeynep
    • Vance, Anthony
    Association for Information Systems AIS Electronic Library (AISeL)
  • Balancing information privacy and operational utility in healthcare: proposing a privacy impact assessment (PIA) framework
    • Lowry, Paul Benjamin
    • Parks, Parks, Rachida F.
    • Wigand, Rolf T
    European Journal of Information Systems
  • Elite Journal Understanding Inconsistent Employee Compliance with Information Security Policies Through the Lens of the Extended Parallel Process Model
    • Lowry, Paul Benjamin
    • Chen, Yan
    • Galletta, Dennis F.
    • Luo, Xin (Robert)
    • Moody, Gregory D.
    Information Systems Research
  • Elite Journal Watchers, Watched, and Watching in the Digital Age: Reconceptualization of it Monitoring as Complex Action Nets
    • Belanger, France
    • Zorina, Aljona
    • Kumar, Nanda
    • Clegg, Stewart.
    Organization Science
  • Stock Market Reactions to Favorable and Unfavorable Information Security Events: A Systematic Literature Review
    • Lowry, Paul Benjamin
    • Brown, Nicholas James
    • Ali, Syed Emad Azhar
    • Lai, Fong-Woon
    • Dominic, P.D.D.
    • Ali, Rao Faizan
    Computers & Security
  • Reconsidering Privacy Choices: The Impact of Defaults, Reversibility, and Repetition.Reconsidering Privacy Choices: The Impact of Defaults, Reversibility, and Repetition
    • Adjerid, Idris
    • Kormylo, Cameron
    Reversibility and Repetition
  • Breaking Bad in Cyberspace: Understanding Why and How Black Hat Hackers Manage their Nerves to Commit their Virtual Crimes
    • Lowry, Paul Benjamin
    • Silic, Mario
    Information Systems Frontiers
  • Being at the Cutting Edge of Online Shopping: Role of Recommendations and Discounts on Privacy Perceptions
    • Venkatesh, Viswanath
    • Hoehle, Hartmut
    • Aloysius, John A.
    • Nikkhah, Hamid.
    Computers in Human Behavior
  • Privacy Maintenance in Self-Digitization: The Effect of Information Disclosure on Continuance Intentions
    • Belanger, France
    • Crossler, Robert E.
    • Correia, John
    ACM SIGMIS Database: DATABASE for Advances in Information Systems
  • User Compensation as a Data Breach Recovery Action: a Methodological Replication and Investigation of Generalizability Based on the Home Depot Breach
    • Venkatesh, Viswanath
    • Hoehle, Hartmut
    • Wei, Jia
    • Schuetz, Sebastian
    Internet Research
  • Toward an Understanding of the Antecedents to Health Information Privacy Concern: A Mixed Methods Study
    • James, Tabitha L.
    • Fox, Grace
    Information SYstems Frontiers
  • Elite Journal Who's Keeping Score: Oversight of Changing Consumer Credit Infrastructure
    • Janine S. Hiller
    • Lindsay Sain Jones
    American Business Law Journal.
  • Elite Journal Too Good to be True: Firm Social Performance and the Risk of Data Breach
    • Adjerid, Idris
    • D’Arcy, John
    • Angst, Corey M.
    • Glavas, Ante.
    Information Systems Research
  • Elite Journal A Theory of Multilevel Information Privacy Management for the Digital Era
    • Bélanger, France
    • James, Tabitha L.
    Information Systems Research
  • Elite Journal Using Design-Science Based Gamification to Improve Organizational Security Training and Compliance
    • Lowry, Paul Benjamin
    • Silic, Mario.
    Journal of Management Information Systems
  • Elite Journal The Effectiveness of Abstract Versus Concrete Fear Appeals in Information Security
    • Lowry, Paul Benjamin
    • Schuetz, Sebastian W.
    • Pienta, Daniel A.
    • Thatcher, Jason Bennett.
    Journal of Management Information Systems
  • Explaining the Interactions of Humans and Artifacts in Insider Security Behaviors: The Mangle of Practice Perspective
    • Belanger, France
    • Van Slyke, Craig.
    Computers & Security
  • Improving the Design of Information Security Messages by Leveraging the Effects of Temporal Distance and Argument Nature
    • Lowry, Paul B.
    • Schuetz, Sebastian W.
    • Pienta, Daniel A.
    • Thatcher, Jason Bennett.
    Journal of the Association for Information Systems
  • Information Privacy Behavior in the Use of Facebook Apps: A Personality-Based Vulnerability Assessment.
    • Lowry, Paul B.
    • Schyff, Karl van der
    • Flowerday, Stephen
    Heliyon
  • Effects of the Design of Mobile Security Notifications and Mobile App Usability on Users’ Security Perceptions and Continued-Use Intention
    • Lowry, Paul Benjamin
    • Moody, Gregory D.
    • Wu, Dezhi
    • Zhang, Jun
    Information & Management
  • A Review and Theoretical Explanation of the ‘Cyberthreat-Intelligence (CTI) capability’ that Needs to be Fostered in Information Security Practitioners and How This Can Be Accomplished
    • Lowry, Paul Benjamin
    • Shin, Bongsik
    Computers & Security
  • Do Travelers Trust Intelligent Service Robots?
    • Florian, Zach J.
    • Tussyadiah, Lis P.
    • Wang, Jianxi
    Annals of Tourism Research
  • Improving Vulnerability Remediation Through Better Exploit Prediction
    • Adjerid, Idris
    • Baker, Wade
    • Jacobs, Jay
    • Romanosky, Sasha
    Journal of Cybersecurity
  • Elite Journal Killing Me Softly: Organizational E-mail Monitoring Expectations' Impact on Employee and Significant Other Well-Being
    • Becker, William J.
    • Tuskey, Sarah
    • Belkin, Liuba Y.
    • Conroy, Samantha A.
    Journal of Management
  • Elite Journal Why Would I Use Location-Protective Settings on My Smartphone? Motivating Protective Behaviors and the Existence of the Privacy Knowledge Belief Gap
    • Bélanger, France
    • Crossler, Robert E.
    Information Systems Research
  • Elite Journal An Integrative Theory Addressing Cyberharassment in the Light of Technology-Based Opportunism
    • Lowry, Paul Benjamin
    • Zhang, Jun
    • Moody, Gregory D.
    • Chatterjee, Sutirtha
    • Wang, Chuang
    • Wu, Tailai.
    Journal of Management Information Systems
  • Elite Journal The Adaptive Roles of Positive and Negative Emotions in Organizational Insiders’ Security-Based Precaution Taking
    • Lowry, Paul Benjamin
    • Burns, A.J.
    • Roberts, Tom L.
    • Posey, Clay
    Information Systems Research
  • Elite Journal Digital Borders, Location Recognition, and Experience Attribution Within a Digital Geography
    • Lowry, Paul Benjamin
    • Dunn, Brian Kimball
    • Galletta, Dennis F.
    • Ramasubbu.
    Journal of Managment Information Systems
  • Does Opportunity Make the Thief? Abilities and Moral Disengagement in Illegal Downloading
    • Lowry, Paul Benjamin
    • Olivero, Nadia
    • Greco, Andrea
    • Annoni, Anna Maria
    • Steca, Patrizia
    Behaviour & Information Technology
  • The Influence of Role Stress on Self-Disclosure on Social Networking Sites: A Conservation of Resources Perspective
    • Lowry, Paul Benjamin
    • Zhang, Shanshan
    • Kwok, Ron Chi-Wai
    • Liu, Zhiying
    • Wu, Ji
    Information & Management
  • Institutional Governance and Protection Motivation: Theoretical Insights into Shaping Employees’ Security Compliance Behavior in Higher Education Institutions in the Developing World
    • Lowry, Paul Benjamin
    • Hina, Sadaf
    • Selvam, Dhanapal Durai Dominic Panneer
    Computers & Security
  • Does More Accessibility Lead to More Disclosure? Exploring the Influence of Information Accessibility on Self-Disclosure in Online Social Networks
    • Lowry, Paul Benjamin
    • Zhang, Shanshan
    • Kwok, Ron Chi-Wai
    • Liu, Zhiying
    Information Technology & People
  • Predictability for Privacy in Data Driven Government
    • Janine Hiller
    • Jordan Blanke
    Minnesota Journal of Law, Science & Technology
  • Dealing With Digital Traces: Understanding Protective Behaviors on Mobile Devices
    • Belanger, France
    • Crossler, Robert E.
    The Journal of Strategic Information Systems
  • Elite Journal Consumer Consent and Firm Targeting After GDPR: The Case of a Large Telecom Provider
    • Adjerid, Idris
    • Godino de Matos, Miguel
    Management Science
  • A Tale of Two Deterrents: Considering the Role of Absolute and Restrictive Deterrence in Inspiring New Directions in Behavioral and Organizational Security
    • Lowry, Paul Benjamin
    • Willison, Robert
    • Paternoster
    Journal of the Association for Information Systems
  • Information Security Policy Violations: A Grounded Theory Approach to Counterfactual Balance and Tensions
    • Lowry, Paul Benjamin
    • Njenga, Kennedy
    Information Systems Security
  • The Quest for Complete Security: An Empirical Analysis of Users Multi-Layered Protection from Security Threats
    • Bélanger, France
    • Crossler, Robert E.
    • Ormond, Dustin
    Information Systems Frontier
  • Exposing Others’ Information on Online Social Networks (OSNs): Perceived Shared Risk, its Determinants, and its Influence on OSN Privacy Control Use
    • James, Tabitha L.
    • Wallace, Linda
    • Warkentin, Merrill
    • Kim, Byung Cho
    • Collignon, Stephane E.
    Information & Management
  • Elite Journal To Cyberloaf or not to Cyberloaf: The Impact of the Announcement of Formal Organizational Controls
    • Khansa, Lara
    • Kuem, Jungwon
    • Siponen, Mikko
    • Kim, Sung S.
    Journal of Management Information Systems

For questions or to add your research to the list, contact

Shea Walters
Communications and Program Assistant
sheasw@vt.edu
(540) 231-6601