Jeffrey D. Wall

Assistant Professor in the School of Business and Economics at Michigan Tech

Research Interests

Behavioral information security; information privacy; deviant behavior; organizational deviance; social learning; social influence; global privacy and security issues and behavior

I have a strong interest in deviance and compliance. As evidenced by my published and forthcoming research, I study and will continue to study deviance and compliance at the organizational and individual levels. I am interested in understanding what deviance and compliance are in IT settings and what factors affect individual and organizational behavior, particularly social and normative factors. Much of my research fits cleanly within behavioral information security research. Since 2009, behavioral information security research has gained status in all of the IS discipline’s top journals, yet it is still in a nascent state. This research area provides ample room for research contribution. I am working on several theory and review papers that seek to understand and organize the study of compliance and noncompliance, and management interventions in security contexts to provide an agenda for future research. These papers provide several directions for my own research. Although much of my research currently focuses on deviance and compliance by employees in organizational settings, I am also interested in hacking and other forms of cybercrime and cyberterrorism, financial fraud, and deviance in supply chains (e.g., opportunism). I have conducted research on deviance and compliance in multiple settings, including: for-profit organizations, governments, healthcare organizations, and supply chain settings. I am also concerned with susceptibility to security violations in the form of privacy behaviors (e.g., information sharing and privacy coping behaviors). I am currently working on critical, interpretive, and positivist research studies and I feel comfortable working under each paradigm.

Peer Reviewed Journal Publications

I have attempted to develop relationships with faculty outside of the IS department and outside of my institution. I believe that developing these relationships can improve the diversity and quality of research ideas.

* Researchers from other departments at my same institution.
** Researchers from other institutions.

The following are my peer reviewed journal publications:

  1. **Jiang, Ling, **Mirkovski, Kristijan, Wall, Jeffrey D., **Wagner, Christian, and **Lowry, Paul Benjamin (2018). Proposing the Core Contributor Withdrawal Theory (CCWT) to Understand Core Contributor Withdrawal from Online Peer-Production Communities. Internet Research
  2. Wall, Jeffrey D., Singh, Rahul (2018). The Organization Man and the Innovator: Theoretical archetypes to inform behavioral information security research. The Data Base for Advances in Information Systems
  3. Wall, Jeffrey D., Buche, Mari (2017). To fear or not to fear? A critical review and analysis of fear appeals in the information security context. Communications of the Association for Information Systems
  4. Wall, Jeffrey D., Singh, Rahul (2017). Contextualized meaning extraction: A meta-algorithm for big data text mining with pragmatics. International Journal of Organizational and Collective Intelligence
  5. Wall, Jeffrey D., **Lowry, Paul Benjamin, and **Barlow, Jordan (2016). Organizational violations of externally governed privacy and security rules: Explaining and predicting selective violations under conditions of strain and excess. Journal of the Association for Information Systems
  6. Wall, Jeffrey D., **Stahl, Bernd C., and Salam, A.F. (2015). Critical discourse analysis as a review methodology: An empirical example. Communications of the Association for Information Systems
  7. Wall, Jeffrey D., **Knapp, Janice (2015). Learning computing topics in undergraduate information systems courses: Managing perceived difficulty. Journal of Information Systems Education
  8. Nemati, Hamid, Wall, Jeffrey D., *Chow, Anthony (2014). Privacy coping and information sharing behaviors in social media: A comparison of Chinese and U.S. users. Journal of Global Information Technology Management
  9. Wall, Jeffrey D., Palvia, Prashant, and **Lowry, Paul Benjamin (2013). Control-related motivations and information security policy compliance: The role of autonomy and efficacy. Journal of Information Privacy and Security

Conference Proceedings, Workshops, and Presentations

The following are publications that have appeared in conferences and workshops:

  1. Wall, Jeffrey D., Buche, Mari (2017). Integrating outcome oriented policy in information security policies: An examination of security perceptions, motivations, and intentions. Proceedings of 2017 IFIP 8.11/11.13 Dewald Roode Information Security Research Workshop, St. Pete Beach, FL.
  2. Wall, Jeffrey D., Buche, Mari (2016). The influence of outcome-oriented security policy on security perceptions and intentions. Proceedings of the 11th Midwest Association for Information Systems Conference, Milwaukee, WI.
  3. Singh, Rahul, Wall, Jeffrey D., Dhillon, Gurpreet (2014). Archetypes to inform information security: The Organization Man and the Innovator. Proceedings of the 20th Americas Conference on Information Systems, Savannah, GA.
  4. Wall, Jeffrey D., Stahl, Bernd, Daynes, Sarah (2014). Critical discourse analysis as a theory and review methodology. Proceedings of the 20th Americas Conference on Information Systems, Savannah, GA.
  5. Nemati, Hamid, Wall, Jeffrey D., and Chow, Anthony (2013). An exploratory study of privacy coping and information sharing behaviors in social media: A comparison of US and Chinese users. Accepted to the International Conference on Information Systems 2013, Milan, Italy.
  6. Wall, Jeffrey D., Palvia, Prashant, and D'Arcy, John (2013). A review and typology of security-related corruption controls: Setting an agenda for studying the behavioral effects of security countermeasures. Proceedings of the 2013 Dewald Roode Information Security Workshop, Buffalo, NY.
  7. Wall, Jeffrey D., Iyer, Lakshmi, Salam, A. F., and Siponen, Mikko (2013). Conceptualizing employee compliance and noncompliance in information security research: A review and research agenda. Proceedings of the 2013 Dewald Roode Information Security Workshop, Buffalo, NY.
  8. Wall, Jeffrey D., Iyer, Lakshmi, and Salam, A. F. (2013). Are conceptualizations of compliance and noncompliance in information security research adequate? Developing taxonomies of compliance and noncompliance. Proceedings of the 19th Americas Conference on Information Systems, Chicago, IL.
  9. Wall, Jeffrey D., and Palvia, Prashant (2013). Control-related motivations and information security policy compliance: The effect of reflective and reactive autonomy. Proceedings of the 19th Americas Conference on Information Systems, Chicago, IL.
  10. Wall, Jeffrey D., Gargeya, Vidyaranya, and Lowe, Kevin (2013). Selective organizational deviance: A model of information deviance in supply chains. To be presented at the 73rd Annual Meeting of the Academy of Management, Orlando, FL.
  11. Wall, Jeffrey D. and Iyer, Lakshmi S. (2012). The dark side of leadership in information systems security: A model of the effect of manager transgressions on employee security behaviors. Proceedings of the 18th Americas Conference on Information Systems, Seattle, WA.
  12. Wall, Jeffrey D. and Singh, Rahul (2012). The Organization Man and The Innovator: Sociological archetypes to information organizational information security research. Presented during plenary session at the 11th Annual Security Conference, Las Vegas, NV.
  13. Wall, Jeffrey D. and Nemati, Hamid (2012). Social engineering self-efficacy: Social engineering awareness, recognition, and response. Proceedings of the 43rd Annual Meeting of the Decision Sciences Institute, San Francisco, CA.
  14. Lowry, Paul Benjamin, Wall, Jeffrey D., and Selfridge, James (2011). Why do Healthcare Organizations Choose to Violate Information Technology Privacy Regulations? Proposing the Selective Information Privacy Violations in Healthcare Organizations Model (SIPVHOM). 10th JAIS Theory Development Workshop (pre-ICIS), Shanghai, China.

Research Grants

I have received two grants that have required the development of a proposal and for which I had to compete against many other applicants.

  • Research Grant ($2,000)
    UNCG Graduate School May-Aug 2012
  • Research Grant ($2,000)
    UNCG Graduate School May-Aug 2013
  • Research Grant ($2,500)
    Local company (confidential) Aug 2013

Peer Reviewing Experience

I have acted as a peer reviewer for several journals, conferences, workshops. I am glad to consider other opportunities to review.

Peer Reviewer Award
  • Best Reviewer Award at the 2013 Dewald Roode (IFIP) Security Workshop

Peer Reviewer (Journals)
  • Communication of the Association for Information Systems (CAIS): 3 Article(s)
  • Decision Sciences (DS): 2 Article(s)
  • European Journal of Information Systems (EJIS): 5 Article(s)
  • Information & Management (I&M): 2 Article(s)
  • Information Systems Journal (ISJ): 1 Article(s)
  • Internet Research (IR): 1 Article(s)
  • Journal of the Association for Information Systems (JAIS): 5 Article(s)

Peer Reviewer (Conferences and Workshops)
  • Americas Conference on Information Systems (AMCIS)
  • Business Intelligence Congress (BIC)
  • Design Science Research in Information Systems and Technology Conference (DESRIST)
  • Dewald Roode IFIP Workshop
  • Global Information Technology Management Association World Conference (GITMA)
  • International Conference on Information Systems (ICIS)
  • Pacific Asia Conference on Information Systems (PACIS)

Editorial Service (Conferences and Workshops)
  • Dewald Roode IFIP Workshop Program Co-chair: Managed 10 papers