Gregory D. Moody
University of Nevada, Las Vegas
H-index: 25
North America-United States
Top articles of Gregory D. Moody
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
Testing the dominant mediator in EPPM: An empirical study on household anti-malware software users | Computers & Security | Yitian Xie Mikko Siponen Gabriella Laatikainen Gregory D Moody Xiaosong Zheng | 2024/2/17 |
Examining the differential effectiveness of fear appeals in information security management using two-stage meta-analysis | Journal of Management Information Systems | Paul Benjamin Lowry Gregory D Moody Srikanth Parameswaran Nicholas James Brown | 2023/10/2 |
HARKing and P-Hacking: A Call for More Transparent Reporting of Studies in the Information Systems Field | Communications of the Association for Information Systems | Han-fen Hu Gregory D Moody Dennis F Galletta | 2023 |
Discovering the interplay between defensive avoidance and continued use intention of anti-malware software among experienced home users: A moderated mediation model | Information & Management | Yitian Xie Mikko Siponen Greg Moody Xiaosong Zheng | 2022/3/1 |
Individual Users’ Perceptions of and Resistance to Electronic Health Records System | Jamie Nam Han-fen Hu Greg Moody | 2021 | |
Understanding inconsistent employee compliance with information security policies through the lens of the extended parallel process model | Information Systems Research | Yan Chen Dennis F Galletta Paul Benjamin Lowry Xin Luo Gregory D Moody | 2021/9 |
The nonlinear influence of harmonious information technology affordance on organisational innovation | Information Systems Journal | Sutirtha Chatterjee Gregory D Moody Paul Benjamin Lowry Suranjan Chakraborty Andrew Hardin | 2021/3 |
“Remind Me Later” in Mobile Security Notifications: What Factors Lead to Users’ Deferred Security Coping Behavior? | Jun Zhang Dezhi Wu Nicholas Brown Paul Benjamin Lowry Gregory D Moody | 2020 | |
'Human'in Information Security: Using the Inoculation Defense to Confer Resistance Against Phishing Attacks | Proceedings of the Nineteenth Annual Pre-ICIS Workshop on HCI Research in MIS, Virtual Conference | Dezhi Wu Jun Zhang Paul Benjamin Lowry Gregory D Moody | 2020/12/12 |
Effects of the design of mobile security notifications and mobile app usability on users’ security perceptions and continued use intention | Information & Management | Dezhi Wu Gregory D Moody Jun Zhang Paul Benjamin Lowry | 2020/7/1 |
Information Technology and organizational innovation: Harmonious information technology affordance and courage-based actualization | The Journal of Strategic Information Systems | Sutirtha Chatterjee Gregory Moody Paul Benjamin Lowry Suranjan Chakraborty Andrew Hardin | 2020/3/1 |
Patching The “Human” in Information Security: Using the Inoculation Defense to Confer Resistance Against Phishing Attacks | Dezhi Wu Jun Zhang Nicholas Brown Paul Benjamin Lowry Gregory D Moody | 2020 |