A. J. Burns, III
Contact Information
Email:
|
AJ_Burns@baylor.edu
|
Mailing Address:
|
One Bear Place #98005 Waco, TX 76706
|
Office Location:
|
Foster Business and Innovation 310.42
|
Educational Background
-
DBA - Computer Info. Systems (CIS), Louisiana Tech University
-
MBA - General, Louisiana St Univ Baton Rouge
-
BS - Finance, Louisiana St Univ Baton Rouge
Work Experience
-
Assistant Professor of Information Systems, Baylor University (August 2018 - Present)
-
Assistant Professor, The University of Texas at Tyler (August 2015 - July 2018)
-
Postdoctoral Research Scholar, Vanderbilt University (June 2014 - July 2015)
-
Lecturer, Cornell University (July 2013 - June 2014)
Awards and Honors
-
Certificate for Exceptional Research, Hankamer School of Business (May 20, 2019)
-
Crystal Talon Award for Research Excellence, The University of Texas at Tyler (2017)
Professional Memberships
-
INFORMS (2017 - Present)
-
Association for Computing Machinery (2015 - Present)
-
Association for Information Systems (2012 - Present)
Publications
Basic or Discovery Scholarship
"Security Organizing: A Framework for Organizational Information Security Mindfulness,"
Data Base for Advances in Information Systems, The, Vol. 50, No. 4, (December 2019), pp. 14-27.
"The Adaptive Roles of Positive and Negative Emotions in Organizational Insiders’ Security-Based Precaution Taking,"
Information Systems Research, Vol. 30, No. 4, (December 2019), pp. 1228-1247 (coauthors: Tom L Roberts, M. Clay Posey, Paul B. Lowry).
"Insiders' Adaptations to Security-based Demands in the Workplace: An Examination of Security Behavioral Complexity,"
Information Systems Frontiers, Vol. forthcoming, (August 2019) (coauthors: Clay Posey, Tom L. Roberts).
"Spear phishing in a barrel: Insights from a Targeted Phishing Campaign,"
Journal of Organizational Computing and Electronic Commerce, Vol. 29, No. 1, (2019) (coauthors: M. Eric Johnson, Deanna D. Caputo).
"Intentions to Comply Versus Intentions to Protect: A VIE Theory Approach to Understanding the Influence of Insiders’ Awareness of Organizational SETA Efforts,"
Decision Sciences, Vol. 19, No. 6, (2018) (coauthors: Tom L. Roberts, C Posey, Rebecca J. Bennett, J.F. Courtney).
"The Evolving Cyberthreat to Privacy,"
It Professional, Vol. 20, No. 3, (2018), pp. 64-72 (coauthors: M. Eric Johnson).
"Examining the relationship of organizational insiders' psychological capital with information security threat and coping appraisals,"
Computers in Human Behavior, No. 68, (2017), pp. 190-209 (coauthors: Clay Posey, Tom L. Roberts, Paul Benjamin Lowry).
"Organizational information security as a complex adaptive system: insights from three agent-based models,"
Information Systems Frontiers, Vol. 19, No. 3, (2017), pp. 509-524 (coauthors: Clay Posey, James F. Courtney, Tom L. Roberts, Prabhashi Nanayakkara).
"Taking stock of organisations’ protection of privacy: categorising and assessing threats to personally identifiable information in the USA,"
European Journal of Information Systems, Vol. 26, No. 6, (2017), pp. 585-604 (coauthors: Clay Posey, Uzma Raja, Robert E. Crossler).
"A brief chronology of medical device security,"
Communications of the ACM, Vol. 59, No. 10, (2016), pp. 66-72 (coauthors: M. Eric Johnson, Peter Honeyman).
"Exploring the role of contextual integrity in electronic medical record (EMR) system workaround decisions: An information security and privacy perspective,"
Ais Transactions On Humancomputer Interaction, Vol. 7, No. 3, (2015), pp. 142-165 (coauthors: Jacob Young, Tom L Roberts, James F Courtney, T Selwyn Ellis).
"Securing Health Information,"
It Professional, Vol. 17, No. 1, (2015), pp. 23-29 (coauthors: M. Eric Johnson).