Standout Papers

A review and analysis of deterrence theory in the IS security literature: making... 2008 2026 2014 2020 781
  1. A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings (2011)
    John D’Arcy, Tejaswini Herath European Journal of Information Systems
  2. Seeing the Forest and the Trees: A Meta-Analysis of the Antecedents to Information Security Policy Compliance1 (2019)
    W. Alec Cram, John D’Arcy et al. MIS Quarterly
  3. User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach (2008)
    John D’Arcy, Anat Hovav et al. Information Systems Research
  4. Understanding Employee Responses to Stressful Information Security Requirements: A Coping Perspective (2014)
    John D’Arcy, Tejaswini Herath et al. Journal of Management Information Systems

Citation Impact

1 from Science/Nature 56 standout
Sub-graph 1 of 16

Citing Papers

A typology of validity: content, face, convergent, discriminant, nomological and predictive validity
2024 Standout
Blockchain security enhancement: an approach towards hybrid consensus algorithms and machine learning techniques
2024 Standout
2 intermediate papers

Works of John D’Arcy being referenced

Applying an extended model of deterrence across cultures: An investigation of information systems misuse in the U.S. and South Korea
2011
User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach
2008 Standout
and 1 more

Author Peers

Author Information Systems CNC Social Psychology SPS Last Decade Papers Cites
John D’Arcy 2597 912 442 1246 49 3.7k
Jens Guehring 28 712
Andrew W. Thompson 13 1 11 295
M. Lener 15 1 17 513
Muhammad Atteya 27 400
T. Fujiyoshi 28 532

All Works

Loading papers...

Rankless by CCL
2026