AJ Burns

AJ Burns

Assistant Professor, Stephenson Department of Entrepreneurship & Information Systems
2200 Business Education Complex
501 South Quad Drive
Baton Rouge, LA 70803


  • DBA Business Administration, Louisiana Tech University, Ruston, LA, 2013
  • BS Louisiana State University, Baton Rouge, LA, 2006
  • MBA Louisiana State University, Baton Rouge, 2008


  • Teaching Interests: Organizational Cybersecurity
  • Research Interests: Information Security; Cybersecurity; Behavioral Cybersecurity

Selected Research Publications

  • Burns, A., Posey, C., and Roberts, T. L (2021). Insiders' adaptations to security-based demands in the workplace: An examination of security behavioral complexity. Information Systems Frontiers, 23(2), 343--360.
  • Burns, A., Roberts, T. L, Posey, C., and Lowry, P. Benjamin (2019). The adaptive roles of positive and negative emotions in organizational insiders' security-based precaution taking. Information Systems Research, 30(4), 1228--1247.
  • Burns, A., Roberts, T. L, Posey, C., Bennett, R. J, and Courtney, J. F (2018). Intentions to comply versus intentions to protect: A VIE theory approach to understanding the influence of insiders' awareness of organizational SETA efforts. Decision Sciences, 49(6), 1187--1228.
  • Burns, A., Posey, C., Roberts, T. L, and Lowry, P. Benjamin (2017). Examining the relationship of organizational insiders' psychological capital with information security threat and coping appraisals. Computers in Human Behavior, 68, 190--209.
  • Burns, A., Posey, C., Courtney, J. F, Roberts, T. L, and Nanayakkara, P. (2017). Organizational information security as a complex adaptive system: insights from three agent-based models. Information Systems Frontiers, 19(3), 509--524.
  • Posey, C., Raja, U., Crossler, R. E, and Burns, A. (2017). Taking stock of organisations' protection of privacy: Categorising and assessing threats to personally identifiable information in the USA. European Journal of Information Systems, 26(6), 585--604.
  • Burns, A., Johnson, M. Eric, and Honeyman, P. (2016). A brief chronology of medical device security. Communications of the ACM, 59(10), 66--72.
  • Burns, A., Young, J., Roberts, T. L, Courtney, J. F, and Ellis, T. Selwyn (2015). Exploring the role of contextual integrity in electronic medical record (EMR) system workaround decisions: an information security and privacy perspective. AIS Transactions on Human-Computer Interaction, 7(3), 142--165.

Employed by LSU since

June 1, 2021