The effectiveness of abstract versus concrete fear appeals in information security SW Schuetz, P Benjamin Lowry, DA Pienta, J Bennett Thatcher Journal of Management Information Systems 37 (3), 723-757, 2020 | 121 | 2020 |
Protecting a whale in a sea of phish D Pienta, JB Thatcher, A Johnston Journal of information technology 35 (3), 214-231, 2020 | 46 | 2020 |
“Real impact”: Challenges and opportunities in bridging the gap between research and practice–Making a difference in industry, policy, and society YK Dwivedi, A Jeyaraj, L Hughes, GH Davies, M Ahuja, MA Albashrawi, ... International Journal of Information Management 78, 102750, 2024 | 40 | 2024 |
Improving the design of information security messages by leveraging the effects of temporal distance and argument nature S Schuetz, PB Lowry, D Pienta, J Thatcher Journal of the Association for Information Systems (JAIS) 22 (5), 1376-1428, 2020 | 36 | 2020 |
A taxonomy of phishing: Attack types spanning economic, temporal, breadth, and target boundaries D Pienta, JB Thatcher, AC Johnston | 29 | 2018 |
Can trust be trusted in cybersecurity? D Pienta, S Tams, J Thatcher | 18 | 2020 |
IS information systems a (social) science? J Thatcher, W Pu, D Pienta Communications of the Association for Information Systems 43 (1), 11, 2018 | 18 | 2018 |
Information technology innovativeness and data-breach risk: A longitudinal study Q Wang, EWT Ngai, D Pienta, JB Thatcher Journal of Management Information Systems 40 (4), 1139-1170, 2023 | 15 | 2023 |
Exploring contrasting effects of trust in organizational security practices and protective structures on employees’ security-related precaution taking M Greulich, S Lins, D Pienta, JB Thatcher, A Sunyaev Information Systems Research 35 (4), 1586-1608, 2024 | 10 | 2024 |
Habitual and misplaced trust: the role of the dark side of trust between individual users and cybersecurity systems D Pienta, H Sun, J Thatcher | 7 | 2016 |
Information systems betrayal: When cybersecurity systems shift from agents of protection to agents of harm D Pienta, J Thatcher, H Sun, J George Information Systems 6, 26-2018, 2018 | 4 | 2018 |
Toward Conceptualizing Perplexity in Cybersecurity: An Exploratory Study M Greulich, S Lins, D Pienta, JB Thatcher, A Sunyaev | 2 | 2020 |
The Impact of Culture on Information Security: Exploring the Tension of Flexibility and Control D Pienta, W Pu, R Purvis | 2 | 2017 |
An Empirical Investigation of The Unintended Consequences of Vulnerability Assessments Leading to Betrayal D Pienta, JB Thatcher, RT Wright, PL Roth Journal of the Association for Information Systems 25 (4), 1079-1116, 2024 | 1 | 2024 |
Investigating the Relative Impact of Generative AI vs. Humans on Voluntary Knowledge Contributions G Shan, D Pienta, JB Thatcher | 1 | 2024 |
Do Crowds Validate False Data? Systematic Distortion and Affective Polarization DA Pienta, S Somanchi, N Vishwamitra, N Berente, JB Thatcher Management Information Systems Quarterly 49 (1), 347-366, 2025 | | 2025 |
Balancing fear and confidence: A strategic approach to mitigating human risk in cybersecurity DF Galletta, GD Moody, PB Lowry, R Willison, S Boss, Y Chen, X Luo, ... | | 2025 |
Do Good and Do No Harm Too: Employee-Related Corporate Social (Ir) responsibility and Information Security Performance Q Wang, D Pienta, S Jiang, EWT Ngai, JB Thatcher Journal of the Association for Information Systems 26 (1), 171-204, 2025 | | 2025 |
Unraveling the Dilemma of Stigma Disclosure: The Implications of Social Media and Stigma Discovery on Hiring Y Kwon, JB Thatcher, P Roth, D Pienta | | 2024 |
HOW TO CONVINCE USERS TO PROTECT THEMSELVES AGAINST CYBERSECURITY THREATS R Willison, D Galletta, G Moody, P Lowry, S Boss, Y Chen, X Luo, ... MIS Quarterly Executive, 2024 | | 2024 |