The current study aims to improve the requirements engineering RE communication, as often times p... more The current study aims to improve the requirements engineering RE communication, as often times projects fail due to poorly specified or misunderstood requirements. We use design science methods to build and evaluate a conceptual model which can add value to managers by offering them a set of guidelines and best practices for facilitating the RE communication. We did a qualitative study to investigate what the criteria are for selecting communication artifacts and we discovered that organizational culture plays a key role in this process. We demonstrate that the used artifacts need to adequately reflect the dynamic and intensity of the communication. Finally, we extend the RE process by adding two transitional phases to avoid requirements slipping through the gaps. Our findings indicate that such transitions are more distinct in traditional waterfall organizations and less salient in agile companies. The current study approaches the RE communication process from a design science perspective which adds more knowledge on the topic and addresses some existing issues leading to project failure.
As competition increases in the online world, website owners will investigate ways in which they ... more As competition increases in the online world, website owners will investigate ways in which they can attract more users. Additionally, many consumers suffer ever-increasing time limitations when browsing for a particular item on a website. Users can become frustrated and stressed when they are unable to find those items due to poor information scent, or semantic cues that are meant to lead to their goal. This paper presents and tests a theoretical model to predict how information scent can reduce the amount of stress that consumers experience when seeking information under time constraints. The study also demonstrates the relationships between information scent, time constraints, stress, performance and attitudes toward the website. Results indicate that while high information scent is an important design goal, scent can only be assessed by taking the user’s task into account
We discuss research on GENI, a program of multiple cyberinfrastructure (CI) projects. Drawing on ... more We discuss research on GENI, a program of multiple cyberinfrastructure (CI) projects. Drawing on the concept of technological frames we discuss how the projects’ stakeholders perceived and presented the competing technologies that were part of GENI and how they attempted to influence GENI’s development.
Abstract This work investigates the independent and joint influences of suggestive guidance and c... more Abstract This work investigates the independent and joint influences of suggestive guidance and credibility indicators in a repeated choice environment laden with risk and uncertainty. Consistent with expectations, results from two studies reveal that aggressive and conservative suggestive guidance influence participant decision making. Credibility indicators partially moderate these relationships such that low credibility indicators lead to increased risk taking when suggestive guidance is conservative and decreased risk taking when suggestive guidance is aggressive. Post hoc analyses designed to examine differences in results across the two studies reveal unexpected differences in risk trends across participant type. Together, these findings contribute to the decision support system (DSS) literature by illustrating how credibility indicators can push users toward or away from either beneficial or detrimental suggestive guidance, and further, by challenging the commonly held assumption that inexperienced and experienced decision makers accept similar levels of risk in DSS settings where risk and uncertainty prevail.
A key approach in many organizations to address the myriad of information security threats is enc... more A key approach in many organizations to address the myriad of information security threats is encouraging employees to better understand and comply with information security policies (ISPs). Despite a significant body of academic research in this area, a commonly held but questionable assumption in these studies is that noncompliance simply represents the opposite of compliance. Hence, explaining compliance is only half of the story, and there is a pressing need to understand the causes of noncompliance, as well. If organizational leaders understood what leads a normally compliant employee to become noncompliant, future security breaches might be avoided or minimized. In this study, we found that compliant and noncompliant behaviors can be better explained by uncovering actions that focus not only on efficacious coping behaviors, but also those that focus on frustrated users who must sometimes cope with emotions, too. Employees working from a basis of emotion-focused coping are unab...
52nd Annual Hawaii International Conference on System Sciences (HICSS 2019), Maui, HI, January 8–11 (accepted 11-Sept-2018), 2019
This paper aims to contribute to the concept of ethical CIO leadership through a distinctive focu... more This paper aims to contribute to the concept of ethical CIO leadership through a distinctive focus on virtue ethics. Our research investigates the theoretical significance of CIO virtues on two CIO capabilities and their corresponding influence on the CIO's role effectiveness in organizations.
This research investigates the independent and joint influences of suggestive guidance and credib... more This research investigates the independent and joint influences of suggestive guidance and credibility indicators in a repeated choice environment laden with risk and uncertainty. Consistent with expectations, results from two studies reveal that aggressive and conservative suggestive guidance influence participant decision-making. Credibility indicators partially moderate these relationships such that low credibility indicators lead to increased risk taking when suggestive guidance is conservative and decreased risk taking when suggestive guidance is aggressive. Post-hoc analyses designed to examine differences in results across the two studies reveal unexpected differences in risk trends across participant type. Together, these findings contribute to the decision support system (DSS) literature by illustrating how credibility indicators can push users towards or away from either beneficial or detrimental suggestive guidance, and further, by challenging the commonly held assumption...
Electronic Commerce Research and Applications, May 30, 2014
ABSTRACT Trust and distrust are both considered to be crucial in online truster-trustee relations... more ABSTRACT Trust and distrust are both considered to be crucial in online truster-trustee relationships. Although some research has proposed that trust and distrust are distinct, other research continues to hold that they are merely opposite ends of the same continuum. Given this debate, it is important to consider how distrust is distinguished from trust. To that end, this paper extends the nomological network of distrust and introduces two novel antecedents never introduced in online behavior literature: situational abnormalities and suspicion. For this nomological network, we also propose that trust and distrust coexist in online e-commerce relationships and can result in ambivalence when they both have high attitudinal values (represented in emotions, beliefs, or behaviors). Using an empirical study of online consumer behavior with 521 experienced online consumers, we found strong empirical validation for our newly proposed model. We provide evidence that suspicion and situational abnormalities are separate, important antecedents to distrust. We also examine the effect of ambivalence on the truster’s intentions toward the website and find a small positive effect that increases the user’s intentions toward the website. Finally, we empirically demonstrate the coexistence of trust and distrust as separate constructs and emphasize that distrust has a much larger impact on the truster’s intentions than does trust. We conclude with implications for theory and practice, along with a discussion of the limitations of and future opportunities revealed by this study.
The current study aims to improve the requirements engineering RE communication, as often times p... more The current study aims to improve the requirements engineering RE communication, as often times projects fail due to poorly specified or misunderstood requirements. We use design science methods to build and evaluate a conceptual model which can add value to managers by offering them a set of guidelines and best practices for facilitating the RE communication. We did a qualitative study to investigate what the criteria are for selecting communication artifacts and we discovered that organizational culture plays a key role in this process. We demonstrate that the used artifacts need to adequately reflect the dynamic and intensity of the communication. Finally, we extend the RE process by adding two transitional phases to avoid requirements slipping through the gaps. Our findings indicate that such transitions are more distinct in traditional waterfall organizations and less salient in agile companies. The current study approaches the RE communication process from a design science perspective which adds more knowledge on the topic and addresses some existing issues leading to project failure.
As competition increases in the online world, website owners will investigate ways in which they ... more As competition increases in the online world, website owners will investigate ways in which they can attract more users. Additionally, many consumers suffer ever-increasing time limitations when browsing for a particular item on a website. Users can become frustrated and stressed when they are unable to find those items due to poor information scent, or semantic cues that are meant to lead to their goal. This paper presents and tests a theoretical model to predict how information scent can reduce the amount of stress that consumers experience when seeking information under time constraints. The study also demonstrates the relationships between information scent, time constraints, stress, performance and attitudes toward the website. Results indicate that while high information scent is an important design goal, scent can only be assessed by taking the user’s task into account
We discuss research on GENI, a program of multiple cyberinfrastructure (CI) projects. Drawing on ... more We discuss research on GENI, a program of multiple cyberinfrastructure (CI) projects. Drawing on the concept of technological frames we discuss how the projects’ stakeholders perceived and presented the competing technologies that were part of GENI and how they attempted to influence GENI’s development.
Abstract This work investigates the independent and joint influences of suggestive guidance and c... more Abstract This work investigates the independent and joint influences of suggestive guidance and credibility indicators in a repeated choice environment laden with risk and uncertainty. Consistent with expectations, results from two studies reveal that aggressive and conservative suggestive guidance influence participant decision making. Credibility indicators partially moderate these relationships such that low credibility indicators lead to increased risk taking when suggestive guidance is conservative and decreased risk taking when suggestive guidance is aggressive. Post hoc analyses designed to examine differences in results across the two studies reveal unexpected differences in risk trends across participant type. Together, these findings contribute to the decision support system (DSS) literature by illustrating how credibility indicators can push users toward or away from either beneficial or detrimental suggestive guidance, and further, by challenging the commonly held assumption that inexperienced and experienced decision makers accept similar levels of risk in DSS settings where risk and uncertainty prevail.
A key approach in many organizations to address the myriad of information security threats is enc... more A key approach in many organizations to address the myriad of information security threats is encouraging employees to better understand and comply with information security policies (ISPs). Despite a significant body of academic research in this area, a commonly held but questionable assumption in these studies is that noncompliance simply represents the opposite of compliance. Hence, explaining compliance is only half of the story, and there is a pressing need to understand the causes of noncompliance, as well. If organizational leaders understood what leads a normally compliant employee to become noncompliant, future security breaches might be avoided or minimized. In this study, we found that compliant and noncompliant behaviors can be better explained by uncovering actions that focus not only on efficacious coping behaviors, but also those that focus on frustrated users who must sometimes cope with emotions, too. Employees working from a basis of emotion-focused coping are unab...
52nd Annual Hawaii International Conference on System Sciences (HICSS 2019), Maui, HI, January 8–11 (accepted 11-Sept-2018), 2019
This paper aims to contribute to the concept of ethical CIO leadership through a distinctive focu... more This paper aims to contribute to the concept of ethical CIO leadership through a distinctive focus on virtue ethics. Our research investigates the theoretical significance of CIO virtues on two CIO capabilities and their corresponding influence on the CIO's role effectiveness in organizations.
This research investigates the independent and joint influences of suggestive guidance and credib... more This research investigates the independent and joint influences of suggestive guidance and credibility indicators in a repeated choice environment laden with risk and uncertainty. Consistent with expectations, results from two studies reveal that aggressive and conservative suggestive guidance influence participant decision-making. Credibility indicators partially moderate these relationships such that low credibility indicators lead to increased risk taking when suggestive guidance is conservative and decreased risk taking when suggestive guidance is aggressive. Post-hoc analyses designed to examine differences in results across the two studies reveal unexpected differences in risk trends across participant type. Together, these findings contribute to the decision support system (DSS) literature by illustrating how credibility indicators can push users towards or away from either beneficial or detrimental suggestive guidance, and further, by challenging the commonly held assumption...
Electronic Commerce Research and Applications, May 30, 2014
ABSTRACT Trust and distrust are both considered to be crucial in online truster-trustee relations... more ABSTRACT Trust and distrust are both considered to be crucial in online truster-trustee relationships. Although some research has proposed that trust and distrust are distinct, other research continues to hold that they are merely opposite ends of the same continuum. Given this debate, it is important to consider how distrust is distinguished from trust. To that end, this paper extends the nomological network of distrust and introduces two novel antecedents never introduced in online behavior literature: situational abnormalities and suspicion. For this nomological network, we also propose that trust and distrust coexist in online e-commerce relationships and can result in ambivalence when they both have high attitudinal values (represented in emotions, beliefs, or behaviors). Using an empirical study of online consumer behavior with 521 experienced online consumers, we found strong empirical validation for our newly proposed model. We provide evidence that suspicion and situational abnormalities are separate, important antecedents to distrust. We also examine the effect of ambivalence on the truster’s intentions toward the website and find a small positive effect that increases the user’s intentions toward the website. Finally, we empirically demonstrate the coexistence of trust and distrust as separate constructs and emphasize that distrust has a much larger impact on the truster’s intentions than does trust. We conclude with implications for theory and practice, along with a discussion of the limitations of and future opportunities revealed by this study.
Online Social Media Deviance (OSMD) is one the rise; however, research in this area traditionally... more Online Social Media Deviance (OSMD) is one the rise; however, research in this area traditionally has lacked a strong theoretical foundation. Following calls to reveal the theoretical underpinnings of this complex phenomenon, our study examines the causes of OSMD from several novel angles not used in the literature before, including: (1) the influence of control imbalances (CIs) on deviant behavior, (2) the role of perceived accountability and deindividuation in engendering CI, (3) and the role of IT in influencing accountability and deindividuation. Using an innovative factorial survey method that enabled us to manipulate the IT artifacts for a nuanced view, we tested our model with 507 adults and found strong support for our model. The results should thus have a strong impetus not only on future SM research but also for social media (SM) designers who can use these ideas to further develop SM networks that are safe, supportive, responsible, and constructive.
The explosive global adoption of mobile applications (i.e., apps) has been fraught with security ... more The explosive global adoption of mobile applications (i.e., apps) has been fraught with security and privacy issues. App users typically have a poor understanding of information security; worse, they routinely ignore security notifications designed to increase security on apps. By considering both mobile app interface usability and mobile security notification (MSN) design, we investigate how security perceptions of apps are formed and how these perceptions influence users’ intentions to continue using apps. Accordingly, we designed and conducted a set of controlled survey experiments with 317 participants in different MSN interface scenarios by manipulating the types of MSN interfaces (i.e., high vs. low disruption), the context (hedonic vs. utilitarian scenarios), and the degree of MSN intrusiveness (high vs. low intrusiveness). We found that both app interface usability and the design of MSNs significantly impacted users’ perceived security, which, in turn, has a positive influence on users’ intention to continue using the app. In addition, we identified an important conundrum: disruptive MSNs—a common approach to delivering MSNs—irritate users and negatively influence their perceptions of app security. Thus, our results directly challenge current practice. If these results hold, current practice should shift away from MSNs that interrupt task performance.
Communications of the Association for Information Systems, Jan 1, 2006
As online transactions continue to increase and become a significant part of the global economy, ... more As online transactions continue to increase and become a significant part of the global economy, the ability to accept payments online becomes more important for businesses. This paper evaluates the literature and provides current information for IS researchers and instructors focusing on electronic commerce. In this paper, we explore the components of e-credit providers (conventional, person-to-person, and third-party) and explain how each system processes a single transaction. We then analyze several market leaders in each segment and summarize the strengths and weaknesses of each company. We provide guidelines for selecting an e-credit provider and highlight the options that apply best to online businesses. Finally, we outline potential areas of future research and provide a simple tutorial on creating a business account with PayPal website Payments Standard as an example of an online payment provider.
Proceedings of the Nineteenth Annual Pre-ICIS Workshop on HCI Research in MIS, Virtual Conference, December 12, 2020, pp. 1–5 (recipient of workshop’s “People’s Choice” award), 2020
The COVID-19 pandemic has transformed the workspace, thrusting countless employees from organizat... more The COVID-19 pandemic has transformed the workspace, thrusting countless employees from organizational work settings to their homes, where they work virtually to access key organizational assets through their cyberinfrastructure. This large-scale virtual workforce imposes drastic cybersecurity issues, threats, and challenges to organizations. To onboard and train employees, companies are left with mainly virtual means to deliver SETA training, using two common training approaches: rule-based and mindfulness. Employees are also facing more challenges and distractions at home where practicing rules and mindfulness can become particularly difficult. Drawing on inoculation theory, this study proposes a new training approach to promote higher resiliency and “umbrella protection” against increasing phishing attacks. This study plans to conduct a mobile phishing SETA training field study at an organization to empirically examine the efficacy of the proposed inoculation-based security training method for work-from-home scenarios.
Uploads
Papers by Greg Moody