A. J. Burns, III

Contact Information

Campus Phone:  (254) 710-2258
Mailing Address:  One Bear Place #98005
Waco, TX  76706
Office Location:  Foster Business and Innovation 310.42

Educational Background

  • DBA - Computer Info. Systems (CIS), Louisiana Tech University
  • MBA - General, Louisiana St Univ Baton Rouge
  • BS - Finance, Louisiana St Univ Baton Rouge

Work Experience

  • Assistant Professor of Information Systems, Baylor University (August 2018 - Present)
  • Assistant Professor, The University of Texas at Tyler (August 2015 - July 2018)
  • Postdoctoral Research Scholar, Vanderbilt University (June 2014 - July 2015)
  • Lecturer, Cornell University (July 2013 - June 2014)

Awards and Honors

  • Certificate for Exceptional Research, Hankamer School of Business (May 20, 2019)
  • Crystal Talon Award for Research Excellence, The University of Texas at Tyler (2017)

Professional Memberships

  • INFORMS (2017 - Present)
  • Association for Computing Machinery (2015 - Present)
  • Association for Information Systems (2012 - Present)


Basic or Discovery Scholarship

"Security Organizing: A Framework for Organizational Information Security Mindfulness," Data Base for Advances in Information Systems, The, Vol. 50, No. 4, (December 2019), pp. 14-27.

"The Adaptive Roles of Positive and Negative Emotions in Organizational Insiders’ Security-Based Precaution Taking," Information Systems Research, Vol. 30, No. 4, (December 2019), pp. 1228-1247 (coauthors: Tom L Roberts, M. Clay Posey, Paul B. Lowry).

"Insiders' Adaptations to Security-based Demands in the Workplace: An Examination of Security Behavioral Complexity," Information Systems Frontiers, Vol. forthcoming, (August 2019) (coauthors: Clay Posey, Tom L. Roberts).

"Spear phishing in a barrel: Insights from a Targeted Phishing Campaign," Journal of Organizational Computing and Electronic Commerce, Vol. 29, No. 1, (2019) (coauthors: M. Eric Johnson, Deanna D. Caputo).

"Intentions to Comply Versus Intentions to Protect: A VIE Theory Approach to Understanding the Influence of Insiders’ Awareness of Organizational SETA Efforts," Decision Sciences, Vol. 19, No. 6, (2018) (coauthors: Tom L. Roberts, C Posey, Rebecca J. Bennett, J.F. Courtney).

"The Evolving Cyberthreat to Privacy," It Professional, Vol. 20, No. 3, (2018), pp. 64-72 (coauthors: M. Eric Johnson).

"Examining the relationship of organizational insiders' psychological capital with information security threat and coping appraisals," Computers in Human Behavior, No. 68, (2017), pp. 190-209 (coauthors: Clay Posey, Tom L. Roberts, Paul Benjamin Lowry).

"Organizational information security as a complex adaptive system: insights from three agent-based models," Information Systems Frontiers, Vol. 19, No. 3, (2017), pp. 509-524 (coauthors: Clay Posey, James F. Courtney, Tom L. Roberts, Prabhashi Nanayakkara).

"Taking stock of organisations’ protection of privacy: categorising and assessing threats to personally identifiable information in the USA," European Journal of Information Systems, Vol. 26, No. 6, (2017), pp. 585-604 (coauthors: Clay Posey, Uzma Raja, Robert E. Crossler).

"A brief chronology of medical device security," Communications of the ACM, Vol. 59, No. 10, (2016), pp. 66-72 (coauthors: M. Eric Johnson, Peter Honeyman).

"Exploring the role of contextual integrity in electronic medical record (EMR) system workaround decisions: An information security and privacy perspective," Ais Transactions On Humancomputer Interaction, Vol. 7, No. 3, (2015), pp. 142-165 (coauthors: Jacob Young, Tom L Roberts, James F Courtney, T Selwyn Ellis).

"Securing Health Information," It Professional, Vol. 17, No. 1, (2015), pp. 23-29 (coauthors: M. Eric Johnson).
Border Title