Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Gregory D. Moody is active.

Publication


Featured researches published by Gregory D. Moody.


Journal of Management Information Systems | 2008

Explaining and Predicting the Impact of Branding Alliances and Web Site Quality on Initial Consumer Trust of E-Commerce Web Sites

Paul Benjamin Lowry; Anthony Vance; Gregory D. Moody; Bryan Beckman; Aaron Read

Trust is a crucial factor in e-commerce. However, consumers are less likely to trust unknown Web sites. This study explores how less-familiar e-commerce Web sites can use branding alliances and Web site quality to increase the likelihood of initial consumer trust. We use the associative network model of memory to explain brand knowledge and to show how the mere exposure effect can be leveraged to improve a Web sites brand image. We also extend information integration theory to explain how branding alliances are able to increase initial trust and transfer positive effects to Web sites. Testing of our model shows that the most important constructs for increasing initial trust in our experimental context are branding and Web site quality. Finally, we discuss future research ideas, limitations, implications, and ideas for practitioners.


Management Information Systems Quarterly | 2015

What do systems users have to fear? using fear appeals to engender threats and fear that motivate protective security behaviors

Scott R. Boss; Dennis F. Galletta; Paul Benjamin Lowry; Gregory D. Moody; Peter Polak

Because violations of information security (ISec) and privacy have become ubiquitous in both personal and work environments, academic attention to ISec and privacy has taken on paramount importance. Consequently, a key focus of ISec research has been discovering ways to motivate individuals to engage in more secure behaviors. Over time, the protection motivation theory (PMT) has become a leading theoretical foundation used in ISec research to help motivate individuals to change their security-related behaviors to protect themselves and their organizations. Our careful review of the foundation for PMT identified four opportunities for improving ISec PMT research. First, extant ISec studies do not use the full nomology of PMT constructs. Second, only one study uses fear-appeal manipulations, even though these are a core element of PMT. Third, virtually no ISec study models or measures fear. Fourth, whereas these studies have made excellent progress in predicting security intentions, none of them have addressed actual security behaviors. This article describes the theoretical foundation of these four opportunities for improvement. We tested the nomology of PMT, including manipulated fear appeals, in two different ISec contexts that model the modern theoretical treatment of PMT more closely than do extant ISec studies. The first data collection was a longitudinal study in the context of data backups. The second study was a short-term cross-sectional study in the context of anti-malware software. Our new model demonstrated better results and stronger fit than the existing models and confirms the efficacy of the four potential improvements we identified.


Journal of the Association for Information Science and Technology | 2012

Using an Elaboration Likelihood Approach to Better Understand the Persuasiveness of Website Privacy Assurance Cues for Online Consumers

Paul Benjamin Lowry; Gregory D. Moody; Anthony Vance; Matthew L. Jensen; Jeffrey L. Jenkins; Taylor Michael Wells

Privacy concerns can greatly hinder consumers’ intentions to interact with a website. The success of a website therefore depends on its ability to improve consumers’ perceptions of privacy assurance. Seals and assurance statements are mechanisms often used to increase this assurance; however, the findings of the extant literature regarding the effectiveness of these tools are mixed. We propose a model based on the elaboration likelihood model (ELM) that explains conditions under which privacy assurance is more or less effective, clarifying the contradictory findings in previous literature. We test our model in a free-simulation online experiment, and the results of the analysis indicate that the inclusion of assurance statements and the combination, understanding, and assurance of seals influence privacy assurance. Privacy assurance is most effective when seals and statements are accompanied by the peripheral cues of website quality and brand image and when counter-argumentation - through transaction risk - is minimized. Importantly, we show ELM to be an appropriate theoretical lens to explain the equivocal results in the literature. Finally, we suggest theoretical and practical implications.


Information & Management | 2013

Using the theory of interpersonal behavior to explain non-work-related personal use of the Internet at work

Gregory D. Moody; Mikko T. Siponen

Non-work-related personal use of the Internet within organizations has received increased attention from scholars. We increase previous understanding of this phenomenon by proposing a novel model based on the theory of interpersonal behavior (TIB). The TIB includes previous researched constructs (i.e., attitudes, social influence, and intentions) as well as emotional factors, habits, and different sources of social influence. Our results (N=238) suggest that the model well predicts the use of the Internet at work for non-work purposes. Our results shed new light on the influence of habit, affect, role, and self-concept in the use of the Internet.


Information Systems Journal | 2015

Proposing the control-reactance compliance model CRCM to explain opposing motivations to comply with organisational information security policies

Paul Benjamin Lowry; Gregory D. Moody

Organisations increasingly rely on information and related systems, which are also a source of risk. Unfortunately, employees represent the greatest risk to organisational information because they are the most frequent source of information security breaches. To address this ‘weak link’ in organisational security, most organisations have strict information security policies (ISPs) designed to thwart employee information abuses. Regrettably, these ISPs are only partially effective because employees often ignore them, circumvent them or even do the opposite of what management desires. Research on attempts to increase ISP compliance has produced similarly mixed results. Lack of compliance with ISPs is a widespread organisational issue that increasingly bears disproportionately large direct and qualitative costs that undermine strategy.


hawaii international conference on system sciences | 2006

A Theoretical Model and Empirical Results Linking Website Interactivity and Usability Satisfaction

Paul Benjamin Lowry; Trent Spaulding; Taylor Michael Wells; Gregory D. Moody; Kevin Moffit; Sebastian Madariaga

Usability is a key component of websites that are commercially successful. Interactivity has been inconclusively linked to website usability. This study strengthens the theoretical understanding of how interactivity affects usability by measuring user satisfaction — a subconstruct of usability — across bookstore and e-card websites. We build on theoretical models from Liu and Shrum [17] and Khalifa and Liu [15]. Users were asked to perform tasks of varying levels of interactivity at bookstore and e-card websites. Measures were obtained for the user’s expectations of, desires for, and satisfaction with the websites. Results indicate that interactivity is successfully able to increase website satisfaction. Finally, implications for practitioners, limitations of the study, and directions for future research are addressed.


Electronic Commerce Research and Applications | 2014

When trust and distrust collide online: The engenderment and role of consumer ambivalence in online consumer behavior

Gregory D. Moody; Dennis F. Galletta; Paul Benjamin Lowry

Trust and distrust are both considered to be crucial in online truster-trustee relationships. Although some research has proposed that trust and distrust are distinct, other research continues to hold that they are merely opposite ends of the same continuum. Given this debate, it is important to consider how distrust is distinguished from trust. To that end, this paper extends the nomological network of distrust and introduces two novel antecedents never introduced in online behavior literature: situational abnormalities and suspicion. For this nomological network, we also propose that trust and distrust coexist in online e-commerce relationships and can result in ambivalence when they both have high attitudinal values (represented in emotions, beliefs, or behaviors). Using an empirical study of online consumer behavior with 521 experienced online consumers, we found strong empirical validation for our newly proposed model. We provide evidence that suspicion and situational abnormalities are separate, important antecedents to distrust. We also examine the effect of ambivalence on the trusters intentions toward the website and find a small positive effect that increases the users intentions toward the website. Finally, we empirically demonstrate the coexistence of trust and distrust as separate constructs and emphasize that distrust has a much larger impact on the trusters intentions than does trust. We conclude with implications for theory and practice, along with a discussion of the limitations of and future opportunities revealed by this study.


European Journal of Information Systems | 2017

Which phish get caught? An exploratory study of individuals′ susceptibility to phishing

Gregory D. Moody; Dennis F. Galletta; Brian Kimball Dunn

Phishing, or the practice of sending deceptive electronic communications to acquire private information from victims, results in significant financial losses to individuals and businesses. The first goal of this study is to identify situational and personality factors that explain why certain individuals are susceptible to such attacks. The second goal is to test those empirically, along with previously identified factors, to explain the likelihood that an individual will fall victim to a phishing attack. We employed the Delphi method to identify seven personality factors that may influence this susceptibility (trust, distrust, curiosity, entertainment drive, boredom proneness, lack of focus, and risk propensity). Our regression model included these as well as variables examined in previous studies. We find that emails sent from a known source significantly increase user susceptibility to phishing, as does a user’s curiosity, risk propensity, general Internet usage, and Internet anxiety. In post hoc tests, we also find that trust and distrust can be significant predictors of susceptibility and that this significance is dependent on the characteristics of the message.


Journal of Management Information Systems | 2015

Lost in Cyberspace: The Impact of Information Scent and Time Constraints on Stress, Performance, and Attitudes Online

Gregory D. Moody; Dennis F. Galletta

Abstract As competition online increases, website owners investigate ways in which they can attract and retain more users. One avenue is to reduce frustration and stress for the users. Furthermore, many website users are rushed when browsing for specific information on a website. To save time and prevent frustration, website owners should try to maximize information scent, that is, visual, audio, and semantic cues that are meant to lead or guide the user to his or her informational goal. This paper presents and tests a model to predict how information scent can reduce the amount of stress that consumers experience when seeking information under time constraints. The study also demonstrates the relationships between information scent, time constraints, stress, performance, and attitudes toward the website. Results demonstrate that high information scent is an important design goal for a website, and latent semantic analysis can be a useful tool for measuring scent. In addition, rather than an attribute of an overall site, the concept of scent is demonstrated to be dependent on both the website and the task(s) being performed by the user. This finding demonstrates that to maximize users’ satisfaction and ability to accomplish their goals, website designers need to determine what tasks users need to accomplish, and to make sure that the links on each page point clearly to the appropriate destination to meet those goals. The latent semantic analysis tool can provide an indication of strength and clarity of the links. Clear links gain even more importance when considering the time constraints of users. Measurable stress explains some of the variance in performance and attitudes.


Journal of Management Information Systems | 2015

Strategic Relevance of Organizational Virtues Enabled by Information Technology in Organizational Innovation

Sutirtha Chatterjee; Gregory D. Moody; Paul Benjamin Lowry; Suranjan Chakraborty; Andrew M. Hardin

Abstract The central theme of this paper is that information technology (IT) can serve to create ethical organizations endowed with virtuous characteristics, and that such ethical organizations can innovate better in today’s dynamic market environment. Drawing on the notion of virtue ethics propounded by the Greek philosopher Aristotle, we theorize that core organizational IT affordances influence the development of organizational virtues, which in turn influence organizational improvisational capabilities and innovation. We propose the “IT-virtues-innovation” (IVI) model and test it using a cross-organizational survey of 250 employees from various organizations in the United States. Our findings largely support our proposal that IT affordances positively influence organizational virtues, which then influence organizational improvisational capabilities, thus improving organizational innovation. This paper contributes to the understanding of organizational innovation by articulating the strategic usefulness of IT-enabled organizational ethics, and it explains how IT-enabled ethical competence (virtues) influences strategic competence (improvisational capabilities and innovation).

Collaboration


Dive into the Gregory D. Moody's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Anthony Vance

Brigham Young University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Dezhi Wu

Southern Utah University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge