Greg D. Moody

Orcid: 0000-0001-7287-7336

Affiliations:
  • University of Nevada, Las Vegas, Lee Business School, NV, USA


According to our database1, Greg D. Moody authored at least 48 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Testing the dominant mediator in EPPM: An empirical study on household anti-malware software users.
Comput. Secur., 2024

2023
Examining the Differential Effectiveness of Fear Appeals in Information Security Management Using Two-Stage Meta-Analysis.
J. Manag. Inf. Syst., 2023

2022
Discovering the interplay between defensive avoidance and continued use intention of anti-malware software among experienced home users: A moderated mediation model.
Inf. Manag., 2022

HARKing and P-Hacking: A Call for More Transparent Reporting of Studies in the Information Systems Field.
Commun. Assoc. Inf. Syst., 2022

2021
Understanding Inconsistent Employee Compliance with Information Security Policies Through the Lens of the Extended Parallel Process Model.
Inf. Syst. Res., 2021

The nonlinear influence of harmonious information technology affordance on organisational innovation.
Inf. Syst. J., 2021

Individual Users' Perceptions of and Resistance to Electronic Health Records System.
Proceedings of the 42nd International Conference on Information Systems, 2021

2020
Information Technology and organizational innovation: Harmonious information technology affordance and courage-based actualization.
J. Strateg. Inf. Syst., 2020

Effects of the design of mobile security notifications and mobile app usability on users' security perceptions and continued use intention.
Inf. Manag., 2020

2019
An Integrative Theory Addressing Cyberharassment in the Light of Technology-Based Opportunism.
J. Manag. Inf. Syst., 2019

The Effect of CIO Virtues on CIO Role Effectiveness.
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

2018
Toward a Unified Model of Information Security Policy Compliance.
MIS Q., 2018

Selecting Communication Artifacts for Requirements Engineering.
J. Inf. Technol. Theory Appl., 2018

2017
Using IT Design to Prevent Cyberbullying.
J. Manag. Inf. Syst., 2017

Assessing the Credibility of Decisional Guidance Delivered by Information Systems.
J. Manag. Inf. Syst., 2017

Here we go again! The impact of website ad repetition on recall, intrusiveness, attitudes, and site revisit intentions.
Inf. Manag., 2017

It's complicated: explaining the relationship between trust, distrust, and ambivalence in online transaction relationships using polynomial regression analysis and response surface analysis.
Eur. J. Inf. Syst., 2017

Which phish get caught? An exploratory study of individuals′ susceptibility to phishing.
Eur. J. Inf. Syst., 2017

Using the Control Balance Theory to Explain Social Media Deviance.
Proceedings of the 50th Hawaii International Conference on System Sciences, 2017

2016
"Cargo Cult" science in traditional organization and information systems survey research: A case for using nontraditional methods of data collection, including Mechanical Turk and online panels.
J. Strateg. Inf. Syst., 2016

Facilitating the Transformational: An Exploration of Control in Cyberinfrastructure Projects and the Discovery of Field Control.
Inf. Syst. Res., 2016

Application of Expectancy Violations Theory to communication with and judgments about embodied agents during a decision-making task.
Int. J. Hum. Comput. Stud., 2016

Identifying new temporal coordination requirements for calendar systems through a temporal structure lens.
Comput. Hum. Behav., 2016

2015
What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors.
MIS Q., 2015

Lost in Cyberspace: The Impact of Information Scent and Time Constraints on Stress, Performance, and Attitudes Online.
J. Manag. Inf. Syst., 2015

Strategic Relevance of Organizational Virtues Enabled by Information Technology in Organizational Innovation.
J. Manag. Inf. Syst., 2015

Proposing the Multimotive Information Systems Continuance Model (MISC) to Better Explain End-User System Evaluations and Continuance Intentions.
J. Assoc. Inf. Syst., 2015

Proposing the control-reactance compliance model (CRCM) to explain opposing motivations to comply with organisational information security policies.
Inf. Syst. J., 2015

Communication Artifacts for Requirements Engineering.
Proceedings of the New Horizons in Design Science: Broadening the Research Agenda, 2015

2014
When trust and distrust collide online: The engenderment and role of consumer ambivalence in online consumer behavior.
Electron. Commer. Res. Appl., 2014

2013
Evaluating Journal Quality and the Association for Information Systems Senior Scholars' Journal Basket Via Bibliometric Measures: Do Expert Journal Assessments Add Value?
MIS Q., 2013

The Drivers in the Use of Online Whistle-Blowing Reporting Systems.
J. Manag. Inf. Syst., 2013

Using the theory of interpersonal behavior to explain non-work-related personal use of the Internet at work.
Inf. Manag., 2013

Explaining the Engenderment and Role of Consumer Ambivalence in E-Commerce.
Proceedings of the 17th Pacific Asia Conference on Information Systems, 2013

Explaining Opposing Compliance Motivations towards Organizational Information Security Policies.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013

Security, But at What Cost? - An Examination of Security Notifications within a Mobile Application.
Proceedings of the Human Interface and the Management of Information. Information and Interaction for Health, Safety, Mobility and Complex Environments, 2013

The Effects of Website Familiarity on Website Quality and Intention to Use.
Proceedings of the Human Interface and the Management of Information. Information and Interaction Design, 2013

2012
Using an elaboration likelihood approach to better understand the persuasiveness of website privacy assurance cues for online consumers.
J. Assoc. Inf. Sci. Technol., 2012

Towards A Cross-Cultural Model Of Online Whistle-Blowing Systems Use.
Proceedings of the 16th Pacific Asia Conference on Information Systems, 2012

A Rational Choice Theory Approach towards a Causal Model of Online Advertising Intrusiveness and irritation.
Proceedings of the 20th European Conference on Information Systems, 2012

2011
Gray-Area Phenomenon In Information Systems Development: A Call For Research.
Proceedings of the Pacific Asia Conference on Information Systems, 2011

Which Phish Get Caught? An Exploratory Study of Individual Susceptibility to Phishing.
Proceedings of the International Conference on Information Systems, 2011

2009
The IS Core: An Integration of the Core IS Courses.
J. Inf. Syst. Educ., 2009

2008
Explaining and Predicting the Impact of Branding Alliances and Web Site Quality on Initial Consumer Trust of E-Commerce Web Sites.
J. Manag. Inf. Syst., 2008

I'm Losing Patience with your Site: The Impact of Information Scent and Time Constraints on Effort, Performance, and Attitudes.
Proceedings of the International Conference on Information Systems, 2008

2007
The Interactive Digital Entertainment (IDE) Unification Framework: Creating a Taxonomy of IDE and Lifestyle Computing.
Proceedings of the 40th Hawaii International International Conference on Systems Science (HICSS-40 2007), 2007

2006
Online Payment Gateways Used to Facilitate E-Commerce Transactions and Improve Risk Management.
Commun. Assoc. Inf. Syst., 2006

A Theoretical Model and Empirical Results Linking Website Interactivity and Usability Satisfaction.
Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006


  Loading...