Journal Articles

Revised 8/30/2020

  • Foltz, C. B., Foltz, L. (2020). Mobile users’ information privacy concerns instrument and IoT. Information and Computer Security, 28(3), 359-371.
  • Foltz, C. B., Newkirk, H., Schwager, P. (2016). An Empirical Investigation of Factors that Influence Individual Behavior Toward Changing Social Networking Security Settings. Journal of Theoretical and Applied Electronic Commerce Research, 11(2), 1-15.
  • Foltz, L., Foltz, C. B., Kirschman, S. (2015). Planning for Science, Technology, Engineering, and Math (STEM) Retention: Understanding the Implications of the Theory of Planned Behavior. Planning for Higher Education Journal.
  • Foltz, Charles B. and Janet S. Renwick. “Information Systems Security and Computer Crime in the IS Curriculum: A Detailed Examination.” Journal of Education for Business, Vol. 86, No. 2, 2011, pp. 119-125.
  • Foltz, Charles B., Paul H. Schwager, and John E. Anderson. “Why Users (Fail To) Read Computer Usage Policies.” Industrial Management & Data Systems, Vol. 108, No. 6, 2008, pp. 701-712.
  • Bradley, John, Charles B. Foltz, Barbara Jo White, Harold Wise. “The Impact of Goal Congruence On Project Team Performance.”  International Journal of Applied Management & Technology, Vol. 4, No. 2, 2006, pp. 219-228.
  • Cronan, Timothy Paul, C. Bryan Foltz and Thomas W. Jones. “Information Systems Misuse and Computer Crime:  An Analysis of Demographic Factors and Awareness of University Computer Usage Policies.” Communications of the ACM, Vol. 49, No. 6, 2006, pp. 84-90.
  • Foltz, Charles B., Timothy Paul Cronan, and Thomas W. Jones. “Have You Met Your Organization’s Computer Usage Policy?” Industrial Management and Data Systems, Vol. 105 No 2, 2005, pp. 137-146.
  • Kros, John F., Charles B. Foltz, and Cathrine L. Metcalf. “Assessing & Quantifying the Loss of Network Intrusion” Journal of Computer Information Systems, Vol. XLV, No. 2, Winter 2004-2005, pp. 36-43.
  • Foltz, Charles B. “Cyberterrorism, Computer Crime, and Reality” Information Management and Computer Security, Volume 12, No. 2, February, 2004, pp. 154-166.
  • Foltz, Charles B. and Richard Hauser. “The MIS Academic Area: The State of the Profession.” Academy of Information and Management Sciences Journal, Vol. 7, No. 1, 2004, pp. 37-46.
  • Foltz, Charles B., Margaret O’Hara, and Harold Wise., Standardizing the MIS Course: Benefits and Pitfalls.  Campus-Wide Information Systems, Vol. 21, No. 4, 2004, pp. 163-169.
  • DelVecchio, Susan, Havva Meric, Charles B. Foltz, and Jean-Rene Pelletier. “Exploring Consumers’ Perceptions of Online Credit Card Theft”.  Journal of Internet Commerce, Vol. 1, No. 2, 2002, pp. 17-36.
  • Remington, William S., Zane Swanson, Charles B. Foltz, and Trevor Moores. “Electronic Commerce Viability by Industry Group”. The Mountain Plains Journal of Business and Economics, 2000.


  • De Palma, Paul. Computers in Society 08/09. 2008. McGraw-Hill Osborne. Reprinted “Piracy, Computer Crime, and IS Misuse at the University” by Cronan, Foltz, and Jones from Communications of the ACM, June 2006.