IS

Moody, Gregory D.

Topic Weight Topic Terms
0.316 information security interview threats attacks theory fear vulnerability visibility president vulnerabilities pmt behaviors enforcement appeals
0.301 research journals journal information systems articles academic published business mis faculty discipline analysis publication management
0.266 website users websites technostress stress time online wait delay aesthetics user model image elements longer
0.220 organizational organizations effectiveness factors managers model associated context characteristics variables paper relationships level attention environmental
0.218 project projects development management isd results process team developed managers teams software stakeholders successful complex
0.216 ethical ethics ambidexterity responsibility codes moral judgments code behavior professional act abuse judgment professionals morality
0.199 field work changes new years time change major period year end use past early century
0.181 model research data results study using theoretical influence findings theory support implications test collected tested
0.168 control controls formal systems mechanisms modes clan informal used internal literature outsourced outcome theory configuration
0.167 research researchers framework future information systems important present agenda identify areas provide understanding contributions using
0.159 information environment provide analysis paper overall better relationships outcomes increasingly useful valuable available increasing greater
0.156 public government private sector state policy political citizens governments contributors agencies issues forums mass development
0.155 capabilities capability firm firms performance resources business information technology firm's resource-based competitive it-enabled view study
0.144 issues management systems information key managers executives senior corporate important importance survey critical corporations multinational
0.136 online users active paper using increasingly informational user data internet overall little various understanding empirical
0.133 research study influence effects literature theoretical use understanding theory using impact behavior insights examine influences
0.111 results study research information studies relationship size variables previous variable examining dependent increases empirical variance
0.108 financial crisis reporting report crises turnaround intelligence reports cash forecasting situations time status adequately weaknesses
0.107 trust trusting study online perceived beliefs e-commerce intention trustworthiness relationships benevolence initial importance trust-building examines
0.103 risk risks management associated managing financial appropriate losses expected future literature reduce loss approach alternative

Focal Researcher     Coauthors of Focal Researcher (1st degree)     Coauthors of Coauthors (2nd degree)

Note: click on a node to go to a researcher's profile page. Drag a node to reallocate. Number on the edge is the number of co-authorships.

Galletta, Dennis F. 4 Lowry, Paul Benjamin 4 Barlow, Jordan B. 1 Boss, Scott R. 1
Chatterjee, Sutirtha 1 CHAKRABORTY, SURANJAN 1 Dunn, Brian Kimball 1 Gaskin, James 1
Humpherys, Sean L. 1 Hardin, Andrew 1 Kirsch, Laurie J. 1 Polak, Peter 1
Slaughter, Sandra A. 1 Vance, Anthony 1 Wilson, David W. 1 Weng, Qin 1
AIS Senior Scholars basket of journals 1 anonymity 1 affordance 1 behavior 1
composite ranking or rating 1 computer abuse 1 control 1 cyberinfrastructure projects 1
coping 1 expert opinion 1 ethical organizations 1 fear appeals 1
h-index 1 humanÐcomputer interaction 1 impact factor 1 Information systems journal rankings 1
IT artifacts 1 information scent 1 Internet latent semantic analysis 1 information technology affordances 1
information technology strategy 1 Information security 1 intentions 1 journal quality 1
model comparison 1 nomologies for dissemination of scientific knowledge 1 organizational failure 1 organizational governance 1
online anxiety 1 online stress 1 organizational capabilities 1 organizational courage 1
organizational innovation 1 organizational justice 1 organizational memory affordance 1 organizational temperance 1
organizational virtues 1 organizational wisdom process management 1 project management 1 protection motivation theory 1
risk 1 scientometrics 1 self-citation 1 SenS-6 1
SenS-8 1 strategic action fields 1 system backups 1 trust 1
threat 1 virtue ethics 1 whistle-blowing 1 whistle-blowing reporting systems 1

Articles (6)

Facilitating the Transformational: An Exploration of Control in Cyberinfrastructure Projects and the Discovery of Field Control (Information Systems Research, 2016)
Authors: Abstract:
    Emerging from rapid advances in digitization and technological capabilities is a new form of information systems development project: cyber projects. Cyber projects are complex, massive, and ambitious, often involving hundreds of academic, government, and industry professionals, requiring years of development, and costing millions of dollars. In our study, we examine how control is exercised in cyber projects. Based on a longitudinal study over eight years, we develop a process theory of the control of cyber projects. Initially we observe that project control is driven by the field, i.e., all of the individual or collective entities that subscribe to the general purpose of the project. This form of control is later replaced by a more bureaucratic form from government-sponsored entities to ensure that traditional project objectives are met. Once construction begins and the field understands the implications and promise of the project, we observe that control is again exerted by the primary project users in the field, complemented by authority-based control exerted by the government-sponsored entisty in the field.
Lost in Cyberspace: The Impact of Information Scent and Time Constraints on Stress, Performance, and Attitudes Online (Journal of Management Information Systems, 2015)
Authors: Abstract:
    As competition online increases, website owners investigate ways in which they can attract and retain more users. One avenue is to reduce frustration and stress for the users. Furthermore, many website users are rushed when browsing for specific information on a website. To save time and prevent frustration, website owners should try to maximize information scent, that is, visual, audio, and semantic cues that are meant to lead or guide the user to his or her informational goal. This paper presents and tests a model to predict how information scent can reduce the amount of stress that consumers experience when seeking information under time constraints. The study also demonstrates the relationships between information scent, time constraints, stress, performance, and attitudes toward the website. Results demonstrate that high information scent is an important design goal for a website, and latent semantic analysis can be a useful tool for measuring scent. In addition, rather than an attribute of an overall site, the concept of scent is demonstrated to be dependent on both the website and the task(s) being performed by the user. This finding demonstrates that to maximize users' satisfaction and ability to accomplish their goals, website designers need to determine what tasks users need to accomplish, and to make sure that the links on each page point clearly to the appropriate destination to meet those goals. The latent semantic analysis tool can provide an indication of strength and clarity of the links. Clear links gain even more importance when considering the time constraints of users. Measurable stress explains some of the variance in performance and attitudes. > >
Strategic Relevance of Organizational Virtues Enabled by Information Technology in Organizational Innovation (Journal of Management Information Systems, 2015)
Authors: Abstract:
    The central theme of this paper is that information technology (IT) can serve to create ethical organizations endowed with virtuous characteristics, and that such ethical organizations can innovate better in today's dynamic market environment. Drawing on the notion of virtue ethics propounded by the Greek philosopher Aristotle, we theorize that core organizational IT affordances influence the development of organizational virtues, which in turn influence organizational improvisational capabilities and innovation. We propose the ÒIT-virtues-innovationÓ (IVI) model and test it using a cross-organizational survey of 250 employees from various organizations in the United States. Our findings largely support our proposal that IT affordances positively influence organizational virtues, which then influence organizational improvisational capabilities, thus improving organizational innovation. This paper contributes to the understanding of organizational innovation by articulating the strategic usefulness of IT-enabled organizational ethics, and it explains how IT-enabled ethical competence (virtues) influences strategic competence (improvisational capabilities and innovation). > >
What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors (MIS Quarterly, 2015)
Authors: Abstract:
    Because violations of information security (ISec) and privacy have become ubiquitous in both personal and work environments, academic attention to ISec and privacy has taken on paramount importance. Consequently, a key focus of ISec research has been discovering ways to motivate individuals to engage in more secure behaviors. Over time, the protection motivation theory (PMT) has become a leading theoretical foundation used in ISec research to help motivate individuals to change their security-related behaviors to protect themselves and their organizations. Our careful review of the foundation for PMT identified four opportunities for improving ISec PMT research. First, extant ISec studies do not use the full nomology of PMT constructs. Second, only one study uses fear-appeal manipulations, even though these are a core element of PMT. Third, virtually no ISec study models or measures fear. Fourth, whereas these studies have made excellent progress in predicting security intentions, none of them have addressed actual security behaviors.
The Drivers in the Use of Online Whistle-Blowing Reporting Systems. (Journal of Management Information Systems, 2013)
Authors: Abstract:
    Online whistle-blowing reporting systems (WBRS) have become increasingly prevalent channels for reporting organizational failures. The Sarbanes-Oxley Act and similar international laws now require firms to establish whistle-blowing (WB) procedures and WBRSs, increasing the importance of WB research and applications. Although the literature has addressed conventional WB behavior, it has not explained or measured the use of WBRSs in online contexts that could significantly alter elements of anonymity, trust, and risk for those using such reporting tools. This study proposes the WBRS model (WBRS-M). Using actual working professionals in an online experiment of hypothetical scenarios, we empirically tested the WBRS-M for reporting computer abuse and find that anonymity, trust, and risk are highly salient in the WBRS context. Our findings suggest that we have an improved WB model with increased explanatory power. Organizations can make WB less of a professional taboo by enhancing WBRS users' perceptions of trust and anonymity. We also demonstrate that anonymity means more than the mere lack of identification, which is not as important in this context as other elements of anonymity.
EVALUATING JOURNAL QUALITY AND THE ASSOCIATION FOR INFORMATION SYSTEMS SENIOR SCHOLARS' JOURNAL BASKET VIA BIBLIOMETRIC MEASURES: DO EXPERT JOURNAL ASSESSMENTS ADD VALUE? (MIS Quarterly, 2013)
Authors: Abstract:
    Information systems journal rankings and ratings help scholars focus their publishing efforts and are widely used surrogates for judging the quality of research. Over the years, numerous approaches have been used to rank IS journals, approaches such as citation metrics, school lists, acceptance rates, and expert assessments. However, the results of these approaches often conflict due to a host of validity concerns. In the current scientometric study, we make significant strides toward correcting for these limitations in the ranking of mainstream IS journals. We compare expert rankings to bibliometric measures such as the ISI Impact Factor™, the h-index, and social network analysis metrics. Among other findings, we conclude that bibliometric measures provide very similar results to expert-based methods in determining a tiered structure of IS journals, thereby suggesting that bibliometrics can be a complete, less expensive, and more efficient substitute for expert assessment. We also find strong support for seven of the eight journals in the Association for Information Systems Senior Scholars' "basket" of journals. A cluster analysis of our results indicates a two-tiered separation in the quality of the highest quality IS journals-with MIS Quarterly, Information Systems Research, and Journal of Management Information Systems belonging, in that order, to the highest A+ tier. Journal quality metrics fit nicely into the sociology of science literature and can be useful in models that attempt to explain how knowledge disseminates through scientific communities.