Dr. Posey joined the Department of Management in Fall 2017. Prior to arriving at UCF, he was an Associate Professor in the Information Systems, Statistics and Management Science department as well as the Associate Director of the Cyber Institute at the University of Alabama. His research has been published or is forthcoming in MIS Quarterly, Journal of Management Information Systems, Decision Sciences, European Journal of Information Systems, Journal of Business Ethics, Computers in Human Behavior, and Computers & Security, among others. In addition to interests in online self-disclosure, analytics, and privacy, his research largely focuses on the positive (e.g., compliance, protection-motivated behaviors) and negative (e.g., computer abuse, insider threat) information-security related behaviors of organizational insiders, which research has been funded by the U.S. Department of Defense Personnel Security Research Center (PERSEREC) and IBM.

Selected Publications

  • Burns, AJ, Roberts, T.L., Posey, C., Bennett, R.J., and Courtney, J.F. (Forthcoming). Intentions to Comply Versus Intentions to Protect: A VIE Theory Approach to Understanding the Influence of Insiders’ Awareness of Organizational SETA Efforts. Decision Sciences.
  • Posey, C., Raja, U., Crossler, R.E., and Burns, AJ (Forthcoming). Taking Stock of Organizations’ Protection of Privacy: Categorizing and Assessing Threats to Personally Identifiable Information in the United States. European Journal of Information Systems.
  • Crossler, R.E., and Posey, C. (2017). Robbing Peter to Pay Paul: Surrendering Privacy for Security’s Sake in an Identity Ecosystem. Journal of the Association for Information Systems, 18(7), 487-515.
  • Burns, AJ, Posey, C., Roberts, T.L., and Lowry, P.B. (2017). Examining the Relationship of Organizational Insiders’ Psychological Capital with Information Security Threat and Coping Appraisals. Computers in Human Behavior, 68, 190-209.
  • Burns, AJ, Posey, C., Courtney, J.F., Roberts, T.L., and Nanayakkara, P. (2017). Organizational Information Security as a Complex Adaptive System: Insights from Three Agent-based Models. Information Systems Frontiers, 19(3), 509-524.
  • Drake, J.R., Hall, D., Becton, B., and Posey, C. (2016). Job Applicants’ Information Privacy Protection Responses: Using Social Media for Candidate Screening. AIS Transactions on Human-Computer Interaction, 8(4), 160-184.
  • Posey, C., Roberts, T.L., and Lowry, P.B. (2015). The Impact of Organizational Commitment on Insiders’ Motivation to Protect Organizational Information Assets. Journal of Management Information Systems, 32(4), 179-214.
  • Lowry, P.B., Posey, C., Bennett, R.J., and Roberts, T.L. (2015). Leveraging Fairness and Reactance Theories to Deter Reactive Computer Abuse following Enhanced Organizational Information Security Policies: An Empirical Study of the Influence of Counterfactual Reasoning and Organisational Trust. Information Systems Journal, 25(3), 193-230.
  • Posey, C., Roberts, T.L., Lowry, P.B., and Hightower, R.T. (2014). Bridging the Divide: A Qualitative Comparison of Information Security Thought Patterns between Information Security Professionals and Ordinary Organizational Insiders. Information & Management, 51(5), 551-567.
  • Lowry, P.B., Posey, C., Roberts, T.L., and Bennett, R.J. (2014). Is Your Banker Leaking Your Personal Information? The Roles of Ethics and Individual-level Cultural Characteristics in Predicting Organizational Computer Abuse. Journal of Business Ethics, 121(3), 385-401.
  • Posey, C., Roberts, T.L., Lowry, P.B., Bennett, R.J., and Courtney, J.F. (2013). Insider’s Protection of Organizational Information Assets: Development of a Systematics-based Taxonomy and Theory of Diversity for Protection-Motivated Behaviors. MIS Quarterly, 37(4), 1189-1210.
  • Posey, C., Bennett, R.J., Roberts, T.L., and Lowry, P.B. (2011). When Computer Monitoring Backfires: Invasion of Privacy and Organizational Injustice as Precursors to Computer Abuse. Journal of Information System Security, 7(1), 24-47.
  • Posey, C., Bennett, R.J., and Roberts, T.L. (2011). Understanding the Mindset of the Abusive Insider: An Examination of Insiders’ Causal Reasoning Following Internal Security Changes. Computers & Security, 30, 486-497.
  • Posey, C., Lowry, P.B., Roberts, T.L., and Ellis, T.S. (2010). Proposing the Online Community Self-Disclosure Model: The Case of Working Professionals in France and the UK Who Use Online Communities. European Journal of Information Systems, 19(2), 181-195.