Our collaboration frequently results in articles that are published in top journals. Notable examples of publications or working papers over the last several years include the following: (Note: Names of our PhD students are in bold type.)
Eargle, D., Galletta, D. F., Janansefat, S., Kunev, D., and Singh, S. “The Chaos of Order: Sequence and Mindlessness Effects in Obtaining Successive App Permissions,” Workshop on IS Privacy , December 2017 .
Kemerer, C. F. and B. K. Dunn, “Netflix Inc.: The Disruptor Faces Disruption,” Ivey School of Business Publishing (University of Western Ontario, Canada), September 2017.
Eargle, D., Galletta, Dennis F., and Jenkins, Jeffrey L., "What’s it (cybersecurity) worth to you? Applying risk tradeoff paradigms to explain user interactions with interruptive security messages" (2016). WISP 2016 Proceedings 14.
Galletta, D. F., Moody, G., and Dunn, B. K. “Which Phish Get Caught? An Exploratory Study of Individual Susceptibility to Phishing,” ICIS best paper nominee, 2017, European Journal of Information Systems.
Moody, G., Lowry, P. B., and Galletta, D .F. It's Complicated: Explaining the Relationship between Trust, Distrust, and Ambivalence in Online Transaction Relationships Using Polynomial Regression Analysis and Response Surface Analysis, European Journal of Information Systems, V. 26, No. 4, March 2017, pp. 379 - 413.
S. McCoy, A. Everard, D. F. Galletta, G. Moody. “Here We Go Again: The impact of Website Ad Repetition on Recall, Intrusiveness, Attitudes, and Site Revisit Intentions,” Information & Management, Vol. 54, Issue 1, Jan . 2017, pp. 14 - 24.
S. McCoy, A. Everard, D. F. Galletta, G. Moody. "A Cognitive, Affective, and Behavioral Model of Online Advertising Intrusiveness and Irritation," Information & Management, Forthcoming.
Eargle, D., Galletta, D. F., Vance, A., Jenkins, J., and Kirwan, B. “Integrating Facial Cues of Threat into Security Warnings – An fMRI and Field Study,” Americas Conference on Information Systems, August 2016.
Moody, G D , Kirsch, L J, Slaughter, S A, Dunn, B K, & Weng, Q. (2016). Facilitating the Transformational: An Exploration of Control in Cyberinfrastructure Projects and the Discovery of Field Control. Information Systems Research , pp. 324 - 346 .
Boss, Scott, Galletta, D.F., Lowry, P.B., Moody, G.D., and Polak, P., What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors in Users, MIS Quarterly , 39(4), pp. 837 - 864, December 2015 .
Galletta, D.F. and Dunn, B. K. (December 2014) “Assessing Smartphone Ease of Use and Learning from the Perspective of Novice and Expert Users,” AIS Transactions on Human - Computer Interaction.
Moody, G. and Galletta, D.F. “ Lost in Cyberspace: The Impact of Information Scent and Time Constraints on Stress, Performance, and Attitudes, ” Journal of MIS, 32(1), 2015, pp. 192 - 224
Mu, E, Kirsch, L. J., & Butler, B. S. (2015). The assimilation of enterprise information system: an interpretation systems perspective. Information & Management, 52(3), 359 - 370.
Chung, R. and Galletta, D. “Assessing the Genetic Basis of Susceptibility to Security Threats,” SIG - HCI Workshop, Milan, Italy, December 2013 (nominated for best paper)
MacCormack, A., Dunn, B., and Kemerer, C., “Barnes & Noble: Managing the E-Book Revolution,” Harvard Business School Case 613073 - PDF - ENG, March 5, 2013.
MacCormack, A., Dunn, B., and Kemerer, C., “Research in Motion: The Mobile OS Platform War,” Harvard Business School Case 613001 - PDF - ENG, July 16, 2012.
Lowry, P.B., Moody, G.D., Gaskin, J., Galletta, D.F., Humpherys, Sean, Barlow, J., and Wilson, D., "Evaluating Journal Quality and the Association for Information Systems (AIS) Senior Scholars ’ Journal Basket via Bibliometric Measures: Do Expert Journal Assessments Add Value?" MIS Quarterly, Dec 2013, pp. 993 - 1012.
Lowry, P.B., Moody, G.D., Galletta, D.F., and Vance, A., "Drivers of Online Whistle - Blowing Reporting Systems Use," Journal of MIS, Summer, 2013, pp. 153 - 190.
Kemerer, C., C. Liu and M. Smith, “Strategies for Tomorrow’s “Winners-Take-Some” Digital Goods Markets”, Communications of the ACM, v. 56, n. 5, pp. 76 - 82, May 2013 .
Liu, C, C Kemerer, S Slaughter, M Smith, “Standards Competition In the Presence of Conver sion Technology: An Empirical Analysis of the Flash Memory Card Market,” MIS Quarterly, 36(3) , pp. 921 - 942, September 2012.