Gregory D Moody

University of Nevada, Las Vegas - College of Business

Assistant Professor

4505 S. Maryland Parkway

Las Vegas, NV 89154

United States

http://https://faculty.unlv.edu/wpmu/gmoody/

SCHOLARLY PAPERS

31

DOWNLOADS
Rank 7,964

SSRN RANKINGS

Top 7,964

in Total Papers Downloads

10,009

SSRN CITATIONS
Rank 8,932

SSRN RANKINGS

Top 8,932

in Total Papers Citations

74

CROSSREF CITATIONS

100

Scholarly Papers (31)

1.

Online Payment Gateways Used to Facilitate E-Commerce Transactions and Improve Risk Management

Communications of the Association for Information Systems (CAIS), Vol. 17, No. 6, pp. 1-48, 2006
Number of pages: 49 Posted: 03 Feb 2006 Last Revised: 25 Aug 2009
Virginia Tech - Pamplin College of Business, California State University, East Bay, University of Nevada, Las Vegas - College of Business, Brigham Young University - Department of Information Systems and My eBiz
Downloads 3,540 (5,696)

Abstract:

Loading...

online payment systems, e-credit, e-commerce, payment gateway, merchant account, shopping cart, PtP payment processes, education

2.

What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors

MIS Quarterly (MISQ), vol. 39 (4), pp. 837–864
Number of pages: 71 Posted: 18 May 2015 Last Revised: 27 Nov 2017
Bentley University, University of Pittsburgh and Director, Katz Doctoral Program, Virginia Tech - Pamplin College of Business, University of Nevada, Las Vegas - College of Business and Florida International University (FIU)
Downloads 1,367 (25,319)
Citation 6

Abstract:

Loading...

Information Security, Protection Motivation Theory, System Backups, Model Comparison, Fear Appeals, Threat, Coping, Intentions, Behavior

3.

Proposing the Multi-Motive Information Systems Continuance Model (MISC) to Better Explain End-User System Evaluations and Continuance Intentions

Journal of the Association for Information Systems, vol. 16(7), pp. 515-579
Number of pages: 81 Posted: 08 Dec 2014 Last Revised: 01 Aug 2015
Paul Benjamin Lowry, James Gaskin and Gregory D Moody
Virginia Tech - Pamplin College of Business, Brigham Young University - Marriott School and University of Nevada, Las Vegas - College of Business
Downloads 1,347 (25,875)
Citation 4

Abstract:

Loading...

Expectations, Intrinsic Motivations, Extrinsic Motivations, Hedonic Motivations, Disconfirmation, Continuance, User Beliefs, Satisfaction, Hedonics, Gaming, Utilitarian Systems, Design Aesthetics, Ease-of-use, Usefulness, Design-expectations Fit

4.

Evaluating Journal Quality and the Association for Information Systems Senior Scholars’ Journal Basket via Bibliometric Measures: Do Expert Journal Assessments Add Value?

MIS Quarterly Vol. 37(4), 993–1012
Number of pages: 63 Posted: 09 Dec 2012 Last Revised: 08 Jan 2018
Virginia Tech - Pamplin College of Business, University of Nevada, Las Vegas - College of Business, Brigham Young University - Marriott School, University of Pittsburgh and Director, Katz Doctoral Program, Brigham Young University - Department of Information Systems, California State University, Fullerton - Mihaylo College of Business & Economics and University of Arizona - Department of Management Information Systems
Downloads 794 (54,684)
Citation 7

Abstract:

Loading...

Information systems journal rankings, scientometrics, bibliometrics, journal quality, SenS-6, SenS-8, self-citation, Impact Factor, h-index, social network analysis, expert opinion, composite ranking or rating, AIS Senior Scholars basket of journals, nomologies for dissemination of scientific knowle

5.

Explaining and Predicting the Impact of Branding Alliances and Website Quality on Initial Consumer Trust of E-Commerce Websites

Journal of Management Information Systems, Vol. 24(4), pp. 199–224 (doi: 10.2753/MIS0742-1222240408), 2008
Number of pages: 58 Posted: 21 Oct 2007 Last Revised: 01 Sep 2014
Virginia Tech - Pamplin College of Business, Brigham Young University - Department of Information Systems, University of Nevada, Las Vegas - College of Business, Georgia State University - Department of Computer Information Systems and University of Nebraska at Omaha - Department of Information Systems and Quantitative Analysis
Downloads 571 (83,486)

Abstract:

Loading...

Trust, Internet, brand image, brand awareness, branding alliance, e-commerce, associative network model of memory, familiarity, and information integration theory

6.

A Theoretical Model and Empirical Results Linking Website Interactivity and Usability Satisfaction

39th Annual Hawaii International Conference on System Sciences, Hawaii, January 4-7, 2006
Number of pages: 10 Posted: 23 Jan 2006 Last Revised: 30 Sep 2009
Virginia Tech - Pamplin College of Business, Brigham Young University - Department of Information Systems, California State University, East Bay, University of Nevada, Las Vegas - College of Business, Brigham Young University - Department of Information Systems and Brigham Young University - Department of Information Systems
Downloads 259 (203,297)

Abstract:

Loading...

interactivity, interaction, usability, websites, satisfaction, HCI, desires, expectations

7.

It's Complicated: Explaining the Relationship between Trust, Distrust, and Ambivalence in Online Transaction Relationships Using Polynomial Regression Analysis and Response Surface Analysis

European Journal of Information Systems (EJIS) vol. 26(4), pp. 379-413, 2015
Number of pages: 74 Posted: 23 Aug 2015 Last Revised: 27 Aug 2017
Gregory D Moody, Paul Benjamin Lowry and Dennis Galletta
University of Nevada, Las Vegas - College of Business, Virginia Tech - Pamplin College of Business and University of Pittsburgh and Director, Katz Doctoral Program
Downloads 175 (292,582)
Citation 4

Abstract:

Loading...

Trust, distrust, ambivalence, electronic transactions, HCI, online behaviour, online relationships, polynomial regression analysis, response surface analysis, Internet, online consumer

8.

Towards a Cross-Cultural Model of Online Whistle-Blowing Systems Use

Proceedings of the 12th Pacific Asia Conference on Information Systems (PACIS 2012), Ho Chi Minh City, Vietnam, July 11-15
Number of pages: 10 Posted: 30 Jun 2013 Last Revised: 05 Sep 2016
Virginia Tech - Pamplin College of Business, Department of Communication Disorders Sciences - Department of Quantitative Methods & Information Systems, University of Nevada, Las Vegas - College of Business and University of Oulu
Downloads 168 (302,991)

Abstract:

Loading...

whistle blowing, whistle blowing systems, culture, Middle East, China, USA, anonymity, trust, risk, cross-cultural comparisons

9.

Using an Elaboration Likelihood Approach to Better Understand the Persuasiveness of Website Privacy Assurance Cues for Online Consumers

Journal of the American Society for Information Science and Technology, vol. 63(4), pp. 755-766 (DOI: 10.1002/asi.21705).
Number of pages: 41 Posted: 24 Oct 2011 Last Revised: 19 Jun 2014
Virginia Tech - Pamplin College of Business, University of Nevada, Las Vegas - College of Business, Brigham Young University - Department of Information Systems, University of Oklahoma - Michael F. Price College of Business, University of Arizona and California State University, East Bay
Downloads 157 (320,971)
Citation 3

Abstract:

Loading...

Elaboration Likelihood Model, argumentation, persuasion, cues, source credibility, website quality, privacy seals, assurance statements, privacy policy statements, brand image, risk

10.

Using it Design to Prevent Cyberbullying

Journal of Management Information Systems (JMIS), vol. 34(3), pp 863–901
Number of pages: 64 Posted: 19 Jun 2017 Last Revised: 27 Nov 2017
Virginia Tech - Pamplin College of Business, University of Nevada, Las Vegas - College of Business and University of Nevada, Las Vegas - Center for Entrepreneurship
Downloads 132 (368,554)
Citation 4

Abstract:

Loading...

Cyberbullying (CB), control balance theory (CBT), social anonymity, anonymity, monitoring, evaluation, control surplus, control deficit, control balance, IT CB prevention capability (ITCBPC), nonlinear mediation, nonlinear moderation, U-shaped curve, inverted U-shaped cure

11.

The Drivers in the Use of Online Whistle-Blowing Reporting Systems

Journal of Management Information Systems, Vol. 30(1), pp. 153-189 (doi: 10.2753/MIS0742-1222300105)
Number of pages: 61 Posted: 11 Nov 2012 Last Revised: 09 Sep 2013
Virginia Tech - Pamplin College of Business, University of Nevada, Las Vegas - College of Business, University of Pittsburgh and Director, Katz Doctoral Program and Brigham Young University - Department of Information Systems
Downloads 119 (398,368)
Citation 1

Abstract:

Loading...

Whistle-blowing, whistle-blowing reporting systems, organizational governance, organizational failure, computer abuse, anonymity, trust, IT artifacts, risk

12.

Application of Expectancy Violations Theory to Communication with and Judgments About Embodied Agents During a Decision-Making Task

International Journal of Human-Computer Studies (IJHCS), vol. 91(July), pp. 24–36, Forthcoming
Number of pages: 47 Posted: 15 Feb 2016 Last Revised: 09 May 2016
University of Arizona - Eller College of Management, University of Arizona, Virginia Tech - Pamplin College of Business, Brigham Young University - Department of Information Systems, University of Nevada, Las Vegas - College of Business, Brigham Young University - Marriott School and University of Arizona - Department of Management Information Systems
Downloads 115 (408,386)
Citation 2

Abstract:

Loading...

Expectancy Violations Theory, embodied agents, human-to-Embodied Agent communication, expectations, social judgment, decision making

13.

Unifying Conflicting Models of Trust and Distrust for Enhanced Understanding and Predictive Power in Organizational Relationships: Proposing the Unified Trust-Distrust Model (UTDM)

Number of pages: 42 Posted: 30 Jun 2013
Gregory D Moody, Dennis Galletta and Paul Benjamin Lowry
University of Nevada, Las Vegas - College of Business, University of Pittsburgh and Director, Katz Doctoral Program and Virginia Tech - Pamplin College of Business
Downloads 113 (413,683)
Citation 3

Abstract:

Loading...

trust, distrust, ambivalence, suspicion, situation abnormality, unified trust-distrust model (UTDM)

14.

The Interactive Digital Entertainment (Ide) Unification Framework: Creating a Taxonomy of Ide and Lifestyle Computing

40th Annual Hawaii International Conference on System Sciences (HICSS) Waikoloa, Big Island, Hawaii, January 3-6, 2007 (doi: 10.1109/HICSS.2007.546))
Number of pages: 11 Posted: 23 Jan 2007 Last Revised: 06 Oct 2009
University of Nevada, Las Vegas - College of Business, California State University, East Bay and Virginia Tech - Pamplin College of Business
Downloads 109 (424,609)

Abstract:

Loading...

interaction, interactivity, digital entertainment, taxonomy, lifestyle computing, IDE

15.

Using the Control Balance Theory to Explain Social Media Deviance

Hawaii International Conference on System Sciences (HICSS-50), Big Island, HI, January 4–7, pp. 2253–2262
Number of pages: 11 Posted: 31 Oct 2016 Last Revised: 13 Mar 2017
Virginia Tech - Pamplin College of Business, University of Nevada, Las Vegas - College of Business and University of Nevada, Las Vegas - Center for Entrepreneurship
Downloads 105 (436,081)

Abstract:

Loading...

16.

Proposing the Control-Reactance Compliance Model (CRCM) to Explain Opposing Motivations to Comply with Organisational Information Security Policies

Information Systems Journal, vol. 25(5), pp. 433-463 (2015)
Number of pages: 51 Posted: 09 Jun 2014 Last Revised: 01 Aug 2015
Paul Benjamin Lowry and Gregory D Moody
Virginia Tech - Pamplin College of Business and University of Nevada, Las Vegas - College of Business
Downloads 105 (436,081)
Citation 5

Abstract:

Loading...

Organisation security, Control theory, Reactance theory, Reactance, Compliance, Information security policies, Policy compliance, Organisational deviance, Threats to freedom, Boomerang effects

17.

Strategic Relevance of Organizational Virtues Enabled by Information Technology in Organizational Innovation

Journal of Management Information Systems (JMIS), vol. 32(3), pp. 1–39 (doi: 10.1080/07421222.2015.1099180)
Number of pages: 53 Posted: 08 Aug 2015 Last Revised: 21 Oct 2015
University of Nevada, Las Vegas - Center for Entrepreneurship, University of Nevada, Las Vegas - College of Business, Virginia Tech - Pamplin College of Business, Towson University and University of Nevada, Las Vegas
Downloads 101 (448,323)
Citation 3

Abstract:

Loading...

Ethical Organizations, Virtue Ethics, IT Affordances, Organizational Capabilities, Organizational Innovation, Collaboration, Organizational Memory, Process Management, IT Strategy, Organizational Wisdom, Organizational Courage, Organizational Justice, Organizational Temperance

18.

Examining the Differential Effectiveness of Fear Appeals in Information Security Management Using Two-Stage Meta-Analysis

Journal of Management Information Systems (JMIS) (10-Apr-2023)
Number of pages: 138 Posted: 24 Apr 2023
Virginia Tech - Pamplin College of Business, University of Nevada, Las Vegas - College of Business, SUNY at Binghamton - School of Management and Virginia Polytechnic Institute & State University, Department of Business Information Technology
Downloads 94 (470,004)

Abstract:

Loading...

security, information security management (ISM), two-stage meta-analytic structural equation modeling (TSSEM), protection motivation theory (PMT), extended parallel process model (EPPM)

19.

Information technology and organizational innovation: Harmonious information technology affordance and courage-based actualization

Journal of Strategic Information Systems (JSIS), vol. 29(1), March, Article 101596, pp. 1–23
Number of pages: 55 Posted: 30 Dec 2019 Last Revised: 04 May 2020
University of Nevada, Las Vegas - Center for Entrepreneurship, University of Nevada, Las Vegas - College of Business, Virginia Tech - Pamplin College of Business, Towson University and University of Nevada, Las Vegas
Downloads 92 (476,613)
Citation 2

Abstract:

Loading...

IT affordance, innovation, matching fit, covariance fit, organizational courage, actualization

20.

The Effect of CIO Virtues on CIO Role Effectiveness

52nd Annual Hawaii International Conference on System Sciences (HICSS 2019), Maui, HI, January 8–11
Number of pages: 10 Posted: 30 Oct 2018
University of Nevada, Las Vegas - Center for Entrepreneurship, University of Virginia, University of Nevada, Las Vegas - College of Business and Virginia Tech - Pamplin College of Business
Downloads 90 (483,125)

Abstract:

Loading...

Virtues, Ethics, Organizational Leadership, Role Effectiveness, CIO, Information Technology, Executives

21.

When Trust and Distrust Collide Online: The Engenderment and Role of Consumer Ambivalence in Online Consumer Behavior

Electronic Commerce Research and Applications, vol. 13(4), pp. 266-282
Number of pages: 55 Posted: 09 Jun 2014 Last Revised: 05 Apr 2015
Gregory D Moody, Dennis Galletta and Paul Benjamin Lowry
University of Nevada, Las Vegas - College of Business, University of Pittsburgh and Director, Katz Doctoral Program and Virginia Tech - Pamplin College of Business
Downloads 88 (489,891)
Citation 1

Abstract:

Loading...

Trust, distrust, ambivalence, online behavior, e-commerce, situational abnormality, situational normality, suspicion, systematic processing, discriminative encoding, heuristic-systematic dual-processing model (HSM), least-effort principle, sufficiency principle

22.

Effects of the Design of Mobile Security Notifications and Mobile App Usability on Users’ Security Perceptions and Continued-Use Intention

Information & Management (I&M),vol. 57(July), Article 103235, pp. 1–15
Number of pages: 50 Posted: 13 Dec 2019 Last Revised: 24 Aug 2020
Dezhi Wu, Gregory D Moody, Jun Zhang and Paul Benjamin Lowry
University of South Carolina, University of Nevada, Las Vegas - College of Business, City University of Hong Kong and Virginia Tech - Pamplin College of Business
Downloads 73 (547,011)
Citation 1

Abstract:

Loading...

Mobile device; mobile security; human–computer interaction(HCI); mobile applications (apps); perceived security; dual-task interference; mobile security notification (MSN)

23.

An Integrative Theory Addressing Cyberharassment in Light of Technology-Based Opportunism

Journal of Management Information Systems (JMIS),vol. 36(4), pp. 1142-1178 (2019)
Number of pages: 78 Posted: 05 Aug 2019 Last Revised: 28 Oct 2019
Virginia Tech - Pamplin College of Business, School of Management, University of Science and Technology of China, University of Nevada, Las Vegas - College of Business, University of Nevada, Las Vegas - Center for Entrepreneurship, City University of Hong Kong (CityU) - Department of Information Systems and City University of Hong Kong (CityU) - Department of Information Systems
Downloads 71 (555,485)
Citation 2

Abstract:

Loading...

Cyberharassment (CH), deviance, self-control theory (SCT), social learning theory (SLT), technology-based opportunism (TBO), social-psychological-technological (S-P-T) phenomenon

24.

‘Cargo Cult’ Science in Traditional Organization and Information Systems Survey Research: A Case for Using Nontraditional Methods of Data Collection, Including Mechanical Turk and Online Panels

Journal of Strategic Information Systems (JSIS), vol. 25(3), pp. 232–240
Number of pages: 21 Posted: 29 Jun 2016 Last Revised: 05 Sep 2016
Virginia Tech - Pamplin College of Business, University of Delaware - Alfred Lerner College of Business and Economics, University of Oklahoma - Division of Management Information Systems (MIS) and University of Nevada, Las Vegas - College of Business
Downloads 65 (582,024)
Citation 9

Abstract:

Loading...

Data collection, surveys, online data, Mechanical Turk, Qualtrics, Survey Monkey, data quality, validity, organization research, information systems research, management research

25.

The IS Core: An Integration of the Core IS Courses

Number of pages: 20 Posted: 31 Aug 2009
Brigham Young University - School of Accountancy, University of Nevada, Las Vegas - College of Business, Brigham Young University - Department of Information Systems and Virginia Tech - Pamplin College of Business
Downloads 63 (591,141)

Abstract:

Loading...

: IS curriculum, Learning, Teaching, Pedagogy, Integrated course design, Cross-course curriculum

26.

Explaining the Engenderment and Role of Consumer Ambivalence in E-Commerce

Pacific Asia Conference on Information Systems (PACIS) 2013, Jeju Island, Korea, June 18-22.
Number of pages: 14 Posted: 30 Jun 2013
Gregory D Moody, Paul Benjamin Lowry and Dennis Galletta
University of Nevada, Las Vegas - College of Business, Virginia Tech - Pamplin College of Business and University of Pittsburgh and Director, Katz Doctoral Program
Downloads 40 (721,828)

Abstract:

Loading...

trust, distrust, online behaviour, ambivalence, e-commerce, situational abnormality, situational normality

27.

The Nonlinear Influence of Harmonious Information Technology Affordance on Organizational Innovation

Information Systems Journal (ISJ) vol. 31(2), pp. 294-322
Number of pages: 59 Posted: 23 Nov 2020 Last Revised: 21 Mar 2021
University of Nevada, Las Vegas - Center for Entrepreneurship, University of Nevada, Las Vegas - College of Business, Virginia Tech - Pamplin College of Business, Towson University and University of Nevada, Las Vegas
Downloads 35 (757,151)

Abstract:

Loading...

Organizational Innovation, Harmonious Information Technology Affordance (HITA), Nonlinearity, Quadratic Relationship, U-Shaped Curve

28.

Explaining Opposing Compliance Motivations Towards Organizational Information Security Policies

46th Annual Hawaii International Conference on System Sciences (HICSS 2013), Mauii, Hawaii, USA, January 7-10
Number of pages: 11 Posted: 30 Jun 2013
Paul Benjamin Lowry and Gregory D Moody
Virginia Tech - Pamplin College of Business and University of Nevada, Las Vegas - College of Business
Downloads 21 (873,351)

Abstract:

Loading...

security, policy compliance, reactance, organizational security

29.

Remind Me Later’ in Mobile Security Notifications: What Factors Lead to Users’ Deferred Security Coping Behavior?

19th Proceedings of the Nineteenth Annual Pre-ICIS Workshop on HCI Research in MIS, Virtual Conference, December 12, 2020, pp. 1–5
Posted: 03 Mar 2021
Jun Zhang, Dezhi Wu, Paul Benjamin Lowry and Gregory D Moody
School of Management, University of Science and Technology of China, University of South Carolina, Virginia Tech - Pamplin College of Business and University of Nevada, Las Vegas - College of Business

Abstract:

Loading...

Mobile security notification, MSN, deferred coping, choice deferral, HCI, dual-task interference

30.

'Human' in Information Security: Using the Inoculation Defense to Confer Resistance Against Phishing Attacks

Proceedings of the Nineteenth Annual Pre-ICIS Workshop on HCI Research in MIS, Virtual Conference, December 12, 2020, pp. 1–5 (recipient of workshop’s “People’s Choice” award)
Posted: 01 Jan 2021
Dezhi Wu, Jun Zhang, Paul Benjamin Lowry and Gregory D Moody
University of South Carolina, School of Management, University of Science and Technology of China, Virginia Tech - Pamplin College of Business and University of Nevada, Las Vegas - College of Business

Abstract:

Loading...

Inoculation theory, resiliency ratio, SETA, ISec, security training, phishing, attack messages

31.

I’m Losing Patience with Your Site: The Impact of Information Scent and Time Constraints on Effort, Performance, and Attitudes

Proceedings of the International Conference on Information Systems, December 14, 2008
Posted: 17 Jun 2009
Gregory D Moody and Dennis Galletta
University of Nevada, Las Vegas - College of Business and University of Pittsburgh and Director, Katz Doctoral Program

Abstract:

Loading...

Human-computer interaction, Internet, language, stress and anxiety, information scent, latent semantic analysis