Foltz, C. B., Foltz, L. (2020). Mobile users’ information privacy concerns instrument and IoT. Information and Computer Security, 28(3), 359-371.
Foltz, C. B., Newkirk, H., Schwager, P. (2016). An Empirical Investigation of Factors that Influence Individual Behavior Toward Changing Social Networking Security Settings. Journal of Theoretical and Applied Electronic Commerce Research, 11(2), 1-15.
Foltz, L., Foltz, C. B., Kirschman, S. (2015). Planning for Science, Technology, Engineering, and Math (STEM) Retention: Understanding the Implications of the Theory of Planned Behavior. Planning for Higher Education Journal.
Foltz, Charles B. and Janet S. Renwick. “Information Systems Security and Computer Crime in the IS Curriculum: A Detailed Examination.” Journal of Education for Business, Vol. 86, No. 2, 2011, pp. 119-125.
Foltz, Charles B., Paul H. Schwager, and John E. Anderson. “Why Users (Fail To) Read Computer Usage Policies.” Industrial Management & Data Systems, Vol. 108, No. 6, 2008, pp. 701-712.
Bradley, John, Charles B. Foltz, Barbara Jo White, Harold Wise. “The Impact of Goal Congruence On Project Team Performance.” International Journal of Applied Management & Technology, Vol. 4, No. 2, 2006, pp. 219-228.
Cronan, Timothy Paul, C. Bryan Foltz and Thomas W. Jones. “Information Systems Misuse and Computer Crime: An Analysis of Demographic Factors and Awareness of University Computer Usage Policies.” Communications of the ACM, Vol. 49, No. 6, 2006, pp. 84-90.
Foltz, Charles B., Timothy Paul Cronan, and Thomas W. Jones. “Have You Met Your Organization’s Computer Usage Policy?” Industrial Management and Data Systems, Vol. 105 No 2, 2005, pp. 137-146.
Kros, John F., Charles B. Foltz, and Cathrine L. Metcalf. “Assessing & Quantifying the Loss of Network Intrusion” Journal of Computer Information Systems, Vol. XLV, No. 2, Winter 2004-2005, pp. 36-43.
Foltz, Charles B. “Cyberterrorism, Computer Crime, and Reality” Information Management and Computer Security, Volume 12, No. 2, February, 2004, pp. 154-166.
Foltz, Charles B. and Richard Hauser. “The MIS Academic Area: The State of the Profession.” Academy of Information and Management Sciences Journal, Vol. 7, No. 1, 2004, pp. 37-46.
Foltz, Charles B., Margaret O’Hara, and Harold Wise., Standardizing the MIS Course: Benefits and Pitfalls. Campus-Wide Information Systems, Vol. 21, No. 4, 2004, pp. 163-169.
DelVecchio, Susan, Havva Meric, Charles B. Foltz, and Jean-Rene Pelletier. “Exploring Consumers’ Perceptions of Online Credit Card Theft”. Journal of Internet Commerce, Vol. 1, No. 2, 2002, pp. 17-36.
Remington, William S., Zane Swanson, Charles B. Foltz, and Trevor Moores. “Electronic Commerce Viability by Industry Group”. The Mountain Plains Journal of Business and Economics, 2000.
De Palma, Paul. Computers in Society 08/09. 2008. McGraw-Hill Osborne. Reprinted “Piracy, Computer Crime, and IS Misuse at the University” by Cronan, Foltz, and Jones from Communications of the ACM, June 2006.