Burns, A., Roberts, T. L., Posey, C., Lowry, P. Benjamin, and Fuller, B. (2023) Going
beyond deterrence: A middle-range theory of motives and controls for insider computer
abuse. Information Systems Research 34 (1), 342-362
Balozian, P., Burns, A., Leidner, D. E. (2023) An Adversarial Dance: Toward an Understanding
of Insiders’ Responses to Organizational Information Security Measures. Journal of
the Association for Information Systems 24 (1), 161-221.
Leidner, D. E., Burns, A., and Balozian, P. (2023) The Backstory of “An Adversarial
Dance”. Journal of the Association for Information Systems 24 (2), 336-344.
Burns, A., Posey, C., and Roberts, T. L (2021). Insiders' adaptations to security-based
demands in the workplace: An examination of security behavioral complexity. Information
Systems Frontiers, 23(2), 343--360.
Burns, A., Roberts, T. L, Posey, C., and Lowry, P. Benjamin (2019). The adaptive roles
of positive and negative emotions in organizational insiders' security-based precaution
taking. Information Systems Research, 30(4), 1228--1247.
Burns, A., Roberts, T. L, Posey, C., Bennett, R. J, and Courtney, J. F (2018). Intentions
to comply versus intentions to protect: A VIE theory approach to understanding the
influence of insiders' awareness of organizational SETA efforts. Decision Sciences,
49(6), 1187--1228.
Burns, A., Posey, C., Roberts, T. L, and Lowry, P. Benjamin (2017). Examining the
relationship of organizational insiders' psychological capital with information security
threat and coping appraisals. Computers in Human Behavior, 68, 190--209.
Burns, A., Posey, C., Courtney, J. F, Roberts, T. L, and Nanayakkara, P. (2017). Organizational
information security as a complex adaptive system: insights from three agent-based
models. Information Systems Frontiers, 19(3), 509--524.
Posey, C., Raja, U., Crossler, R. E, and Burns, A. (2017). Taking stock of organisations'
protection of privacy: Categorising and assessing threats to personally identifiable
information in the USA. European Journal of Information Systems, 26(6), 585--604.
Burns, A., Johnson, M. Eric, and Honeyman, P. (2016). A brief chronology of medical
device security. Communications of the ACM, 59(10), 66--72.
Burns, A., Young, J., Roberts, T. L, Courtney, J. F, and Ellis, T. Selwyn (2015).
Exploring the role of contextual integrity in electronic medical record (EMR) system
workaround decisions: an information security and privacy perspective. AIS Transactions
on Human-Computer Interaction, 7(3), 142--165.