The effectiveness of abstract versus concrete fear appeals in information security SW Schuetz, P Benjamin Lowry, DA Pienta, J Bennett Thatcher Journal of Management Information Systems 37 (3), 723-757, 2020 | 85 | 2020 |
Protecting a whale in a sea of phish D Pienta, JB Thatcher, A Johnston Journal of information technology 35 (3), 214-231, 2020 | 30 | 2020 |
Improving the design of information security messages by leveraging the effects of temporal distance and argument nature S Schuetz, PB Lowry, D Pienta, J Thatcher Journal of the Association for Information Systems (JAIS) 22 (5), 1376-1428, 2020 | 27 | 2020 |
A taxonomy of phishing: Attack types spanning economic, temporal, breadth, and target boundaries D Pienta, JB Thatcher, AC Johnston | 26 | 2018 |
IS information systems a (social) science? J Thatcher, W Pu, D Pienta Communications of the Association for Information Systems 43 (1), 11, 2018 | 16 | 2018 |
Can trust be trusted in cybersecurity? D Pienta, S Tams, J Thatcher | 13 | 2020 |
Habitual and misplaced trust: the role of the dark side of trust between individual users and cybersecurity systems D Pienta, H Sun, J Thatcher | 5 | 2016 |
Information systems betrayal: When cybersecurity systems shift from agents of protection to agents of harm D Pienta, J Thatcher, H Sun, J George Information Systems 6, 26-2018, 2018 | 4 | 2018 |
Toward Conceptualizing Perplexity in Cybersecurity: An Exploratory Study M Greulich, S Lins, D Pienta, JB Thatcher, A Sunyaev | 2 | 2020 |
“Real impact”: Challenges and opportunities in bridging the gap between research and practice–Making a difference in industry, policy, and society YK Dwivedi, A Jeyaraj, L Hughes, GH Davies, M Ahuja, MA Albashrawi, ... International Journal of Information Management, 102750, 2024 | 1 | 2024 |
Exploring Contrasting Effects of Trust in Organizational Security Practices and Protective Structures on Employees’ Security-Related Precaution Taking M Greulich, S Lins, D Pienta, JB Thatcher, A Sunyaev Information Systems Research, 2024 | 1 | 2024 |
Information Technology Innovativeness and Data-Breach Risk: A Longitudinal Study Q Wang, EWT Ngai, D Pienta, JB Thatcher Journal of Management Information Systems 40 (4), 1139-1170, 2023 | 1 | 2023 |
The Impact of Culture on Information Security: Exploring the Tension of Flexibility and Control D Pienta, W Pu, R Purvis | 1 | 2017 |
Unraveling the Dilemma of Stigma Disclosure: The Implications of Social Media and Stigma Discovery on Hiring Y Kwon, JB Thatcher, P Roth, D Pienta | | 2024 |
Investigating the Relative Impact of Generative AI vs. Humans on Voluntary Knowledge Contributions G Shan, D Pienta, JB Thatcher | | 2024 |
An Empirical Investigation of The Unintended Consequences of Vulnerability Assessments Leading to Betrayal D Pienta, JB Thatcher, RT Wright, PL Roth | | 2024 |
Creation and Analysis of a Natural Language Understanding Dataset for DoD Cybersecurity Policies (CSIAC-DoDIN V1. 0) E Quevedo, AP Arguelles, A Rodriguez, J Yero, D Pienta, T Cerny, ... | | 2023 |
You Cheered for Your Favorite Teams: Does it Get You Hired or Penalized? Y Kwon, JB Thatcher, P Roth, D Pienta | | 2021 |