default search action
Greg D. Moody
Person information
- affiliation: University of Nevada, Las Vegas, Lee Business School, NV, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j33]Yitian Xie, Mikko T. Siponen, Gabriella Laatikainen, Gregory D. Moody, Xiaosong Zheng:
Testing the dominant mediator in EPPM: An empirical study on household anti-malware software users. Comput. Secur. 140: 103776 (2024) - 2023
- [j32]Paul Benjamin Lowry, Gregory D. Moody, Srikanth Parameswaran, Nicholas James Brown:
Examining the Differential Effectiveness of Fear Appeals in Information Security Management Using Two-Stage Meta-Analysis. J. Manag. Inf. Syst. 40(4): 1099-1138 (2023) - 2022
- [j31]Han-fen Hu, Gregory D. Moody, Dennis F. Galletta:
HARKing and P-Hacking: A Call for More Transparent Reporting of Studies in the Information Systems Field. Commun. Assoc. Inf. Syst. 52: 37 (2022) - [j30]Yitian Xie, Mikko T. Siponen, Greg D. Moody, Xiaosong Zheng:
Discovering the interplay between defensive avoidance and continued use intention of anti-malware software among experienced home users: A moderated mediation model. Inf. Manag. 59(2): 103586 (2022) - 2021
- [j29]Sutirtha Chatterjee, Gregory D. Moody, Paul Benjamin Lowry, Suranjan Chakraborty, Andrew M. Hardin:
The nonlinear influence of harmonious information technology affordance on organisational innovation. Inf. Syst. J. 31(2): 294-322 (2021) - [j28]Yan Chen, Dennis F. Galletta, Paul Benjamin Lowry, Xin (Robert) Luo, Gregory D. Moody, Robert Willison:
Understanding Inconsistent Employee Compliance with Information Security Policies Through the Lens of the Extended Parallel Process Model. Inf. Syst. Res. 32(3): 1043-1065 (2021) - [c15]Jamie Nam, Han-fen Hu, Greg D. Moody:
Individual Users' Perceptions of and Resistance to Electronic Health Records System. ICIS 2021 - 2020
- [j27]Dezhi Wu, Gregory D. Moody, Jun Zhang, Paul Benjamin Lowry:
Effects of the design of mobile security notifications and mobile app usability on users' security perceptions and continued use intention. Inf. Manag. 57(5): 103235 (2020) - [j26]Sutirtha Chatterjee, Gregory D. Moody, Paul Benjamin Lowry, Suranjan Chakraborty, Andrew M. Hardin:
Information Technology and organizational innovation: Harmonious information technology affordance and courage-based actualization. J. Strateg. Inf. Syst. 29(1): 101596 (2020)
2010 – 2019
- 2019
- [j25]Paul Benjamin Lowry, Jun Zhang, Gregory D. Moody, Sutirtha Chatterjee, Chuang Wang, Tailai Wu:
An Integrative Theory Addressing Cyberharassment in the Light of Technology-Based Opportunism. J. Manag. Inf. Syst. 36(4): 1142-1178 (2019) - [c14]Sutirtha Chatterjee, Suprateek Sarker, Gregory D. Moody, Paul Benjamin Lowry:
The Effect of CIO Virtues on CIO Role Effectiveness. HICSS 2019: 1-10 - 2018
- [j24]Miloslava Plachkinova, Gregory D. Moody, Ken Peffers:
Selecting Communication Artifacts for Requirements Engineering. J. Inf. Technol. Theory Appl. 19(4): 6 (2018) - [j23]Gregory D. Moody, Mikko T. Siponen, Seppo Pahnila:
Toward a Unified Model of Information Security Policy Compliance. MIS Q. 42(1) (2018) - 2017
- [j22]Gregory D. Moody, Paul Benjamin Lowry, Dennis F. Galletta:
It's complicated: explaining the relationship between trust, distrust, and ambivalence in online transaction relationships using polynomial regression analysis and response surface analysis. Eur. J. Inf. Syst. 26(4): 379-413 (2017) - [j21]Gregory D. Moody, Dennis F. Galletta, Brian Kimball Dunn:
Which phish get caught? An exploratory study of individuals′ susceptibility to phishing. Eur. J. Inf. Syst. 26(6): 564-584 (2017) - [j20]Scott McCoy, Andrea Everard, Dennis F. Galletta, Gregory D. Moody:
Here we go again! The impact of website ad repetition on recall, intrusiveness, attitudes, and site revisit intentions. Inf. Manag. 54(1): 14-24 (2017) - [j19]Paul Benjamin Lowry, Gregory D. Moody, Sutirtha Chatterjee:
Using IT Design to Prevent Cyberbullying. J. Manag. Inf. Syst. 34(3): 863-901 (2017) - [j18]Andrew M. Hardin, Clayton A. Looney, Gregory D. Moody:
Assessing the Credibility of Decisional Guidance Delivered by Information Systems. J. Manag. Inf. Syst. 34(4): 1143-1168 (2017) - [c13]Paul Benjamin Lowry, Gregory D. Moody, Sutirtha Chatterjee:
Using the Control Balance Theory to Explain Social Media Deviance. HICSS 2017: 1-10 - 2016
- [j17]Dezhi Wu, Benjamin Ngugi, Gregory D. Moody:
Identifying new temporal coordination requirements for calendar systems through a temporal structure lens. Comput. Hum. Behav. 64: 728-738 (2016) - [j16]Judee K. Burgoon, Joseph A. Bonito, Paul Benjamin Lowry, Sean L. Humpherys, Gregory D. Moody, James E. Gaskin, Justin Scott Giboney:
Application of Expectancy Violations Theory to communication with and judgments about embodied agents during a decision-making task. Int. J. Hum. Comput. Stud. 91: 24-36 (2016) - [j15]Gregory D. Moody, Laurie J. Kirsch, Sandra A. Slaughter, Brian Kimball Dunn, Qin Weng:
Facilitating the Transformational: An Exploration of Control in Cyberinfrastructure Projects and the Discovery of Field Control. Inf. Syst. Res. 27(2): 324-346 (2016) - [j14]Paul Benjamin Lowry, John D'Arcy, Bryan I. Hammer, Gregory D. Moody:
"Cargo Cult" science in traditional organization and information systems survey research: A case for using nontraditional methods of data collection, including Mechanical Turk and online panels. J. Strateg. Inf. Syst. 25(3): 232-240 (2016) - 2015
- [j13]Paul Benjamin Lowry, Gregory D. Moody:
Proposing the control-reactance compliance model (CRCM) to explain opposing motivations to comply with organisational information security policies. Inf. Syst. J. 25(5): 433-463 (2015) - [j12]Paul Benjamin Lowry, James Eric Gaskin, Gregory D. Moody:
Proposing the Multimotive Information Systems Continuance Model (MISC) to Better Explain End-User System Evaluations and Continuance Intentions. J. Assoc. Inf. Syst. 16(7): 3 (2015) - [j11]Gregory D. Moody, Dennis F. Galletta:
Lost in Cyberspace: The Impact of Information Scent and Time Constraints on Stress, Performance, and Attitudes Online. J. Manag. Inf. Syst. 32(1): 192-224 (2015) - [j10]Sutirtha Chatterjee, Gregory D. Moody, Paul Benjamin Lowry, Suranjan Chakraborty, Andrew M. Hardin:
Strategic Relevance of Organizational Virtues Enabled by Information Technology in Organizational Innovation. J. Manag. Inf. Syst. 32(3): 158-196 (2015) - [j9]Scott R. Boss, Dennis F. Galletta, Paul Benjamin Lowry, Gregory D. Moody, Peter Polak:
What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors. MIS Q. 39(4): 837-864 (2015) - [c12]Miloslava Plachkinova, Ken Peffers, Greg D. Moody:
Communication Artifacts for Requirements Engineering. DESRIST 2015: 104-118 - 2014
- [j8]Gregory D. Moody, Dennis F. Galletta, Paul Benjamin Lowry:
When trust and distrust collide online: The engenderment and role of consumer ambivalence in online consumer behavior. Electron. Commer. Res. Appl. 13(4): 266-282 (2014) - 2013
- [j7]Gregory D. Moody, Mikko T. Siponen:
Using the theory of interpersonal behavior to explain non-work-related personal use of the Internet at work. Inf. Manag. 50(6): 322-335 (2013) - [j6]Paul Benjamin Lowry, Gregory D. Moody, Dennis F. Galletta, Anthony Vance:
The Drivers in the Use of Online Whistle-Blowing Reporting Systems. J. Manag. Inf. Syst. 30(1): 153-190 (2013) - [j5]Paul Benjamin Lowry, Gregory D. Moody, James E. Gaskin, Dennis F. Galletta, Sean L. Humpherys, Jordan B. Barlow, David W. Wilson:
Evaluating Journal Quality and the Association for Information Systems Senior Scholars' Journal Basket Via Bibliometric Measures: Do Expert Journal Assessments Add Value? MIS Q. 37(4): 993-1012 (2013) - [c11]Scott McCoy, Eleanor T. Loiacono, Gregory D. Moody, Cristóbal Fernández Robin:
The Effects of Website Familiarity on Website Quality and Intention to Use. HCI (13) 2013: 213-220 - [c10]Gregory D. Moody, Dezhi Wu:
Security, But at What Cost? - An Examination of Security Notifications within a Mobile Application. HCI (14) 2013: 391-399 - [c9]Paul Benjamin Lowry, Greg D. Moody:
Explaining Opposing Compliance Motivations towards Organizational Information Security Policies. HICSS 2013: 2998-3007 - [c8]Gregory D. Moody, Paul Benjamin Lowry, Dennis F. Galletta:
Explaining the Engenderment and Role of Consumer Ambivalence in E-Commerce. PACIS 2013: 173 - 2012
- [j4]Paul Benjamin Lowry, Greg D. Moody, Anthony Vance, Matthew L. Jensen, Jeffrey L. Jenkins, Taylor Wells:
Using an elaboration likelihood approach to better understand the persuasiveness of website privacy assurance cues for online consumers. J. Assoc. Inf. Sci. Technol. 63(4): 755-776 (2012) - [c7]Scott McCoy, Andrea Everard, Dennis F. Galletta, Greg D. Moody:
A Rational Choice Theory Approach towards a Causal Model of Online Advertising Intrusiveness and irritation. ECIS 2012: 124 - [c6]Paul Benjamin Lowry, Kamel Rouibah, Greg D. Moody, Mikko T. Siponen:
Towards A Cross-Cultural Model Of Online Whistle-Blowing Systems Use. PACIS 2012: 147 - 2011
- [c5]Gregory D. Moody, Dennis F. Galletta, Jon Walker, Brian Kimball Dunn:
Which Phish Get Caught? An Exploratory Study of Individual Susceptibility to Phishing. ICIS 2011 - [c4]Tero Vartiainen, Mikko T. Siponen, Gregory D. Moody:
Gray-Area Phenomenon In Information Systems Development: A Call For Research. PACIS 2011: 198
2000 – 2009
- 2009
- [j3]Conan C. Albrecht, Marshall B. Romney, Paul Benjamin Lowry, Greg D. Moody:
The IS Core: An Integration of the Core IS Courses. J. Inf. Syst. Educ. 20(4): 451-468 (2009) - 2008
- [j2]Paul Benjamin Lowry, Anthony Vance, Greg D. Moody, Bryan Beckman, Aaron Read:
Explaining and Predicting the Impact of Branding Alliances and Web Site Quality on Initial Consumer Trust of E-Commerce Web Sites. J. Manag. Inf. Syst. 24(4): 199-224 (2008) - [c3]Gregory D. Moody, Dennis F. Galletta:
I'm Losing Patience with your Site: The Impact of Information Scent and Time Constraints on Effort, Performance, and Attitudes. ICIS 2008: 187 - 2007
- [c2]Greg D. Moody, Taylor Wells, Paul Benjamin Lowry:
The Interactive Digital Entertainment (IDE) Unification Framework: Creating a Taxonomy of IDE and Lifestyle Computing. HICSS 2007: 160 - 2006
- [j1]Paul Benjamin Lowry, Taylor M. Wells, Greg D. Moody, Sean L. Humpherys, Degan Kettles:
Online Payment Gateways Used to Facilitate E-Commerce Transactions and Improve Risk Management. Commun. Assoc. Inf. Syst. 17: 6 (2006) - [c1]Paul Benjamin Lowry, Trent J. Spaulding, Taylor Wells, Greg D. Moody, Kevin Moffit, Sebastian Madariaga:
A Theoretical Model and Empirical Results Linking Website Interactivity and Usability Satisfaction. HICSS 2006
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:05 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint