PhD in Information Systems and Technology Management // Collaborative Research
Kemerer, C. F. & B. K. Dunn, “Netflix Inc.: The Disruptor Faces Disruption,” Ivey School of Business Publishing (University of Western Ontario, Canada), November 2017. Revised (with E. Yttri, 2022, in review. Ivey’s second best-selling case in the world, 2019-2020 academic year, Harvard Business School “Bestseller.”
Chung, R., Galletta, D.F., and A. Durcikova “Knowledge Management Systems: Linking Contribution, Refinement and Use,” working paper, 2022
Chen, Y., D. F. Galletta, P.B. Lowry, X. Luo, G. Moody, & R. Willison. “Understanding Inconsistent Employee Compliance with Information Security Policies through the Lens of the Extended Parallel Process Model,” (Dec 2021), Information Systems Research, 32(3), 1043-1065.
Singh, S., C. Kemerer, & N. Ramasubbu, “Innovation in Complex Assembled Electronic Products: An Analysis of the Evolution of Television Components,” Journal of Operations Management, v. 67 n. 6, pp. 680-703, Sept 2021.
Dunn, B.K., D.F. Galletta, N. Ramasubbu, P. Lowry, & M. Jensen. “The Efficiency-Exposure Paradox: Reconciling the Conflicting Effects of Measured Website Browsing Behaviors for Non-Transactional Outcomes,” (2021), AIS Transactions on Human-Computer Interaction, 13(2), 206-242.
Janansefat, S., C. Liu, & C. Kemerer, “Diversification Strategy for Mobile App Developers: Understanding the Role of App Category Characteristics on App Performance,” European Conference on Information Systems, June 2020.
- Moody, N. Ramasubbu, D.F. Galletta, & P.B. Lowry. “Digital Borders, Location Recognition, and Experience Attribution within a Digital Geography,” (2019). Journal of MIS, 36(2), pp. 418-449.
Im, Il, B.K. Dunn, Dong Il Lee, D.F. Galletta, & S.O. Jeong. “Predicting the Intent of Sponsored Search Users: An Exploratory User Session-Level Analysis,” (2019), Decision Support Systems, 121, 25-36.
Eargle, D., Galletta, D.F., Janansefat, S., Kunev, D., & Singh, S. “The Chaos of Order: Sequence and Mindlessness Effects in Obtaining Successive App Permissions,” Workshop on IS Privacy, December 2017.
Galletta, D.F., Moody, G., & Dunn, B.K. “Which Phish Get Caught? An Exploratory Study of Individual Susceptibility to Phishing,” ICIS best paper nominee, European Journal of Information Systems, (Nov 2017) 26(6), pp. 564-584..
Moody, G., Lowry, P.B., & Galletta, D.F. It’s Complicated: Explaining the Relationship between Trust, Distrust, and Ambivalence in Online Transaction Relationships Using Polynomial Regression Analysis and Response Surface Analysis, European Journal of Information Systems, 26 (4), March 2017, pp. 379-413.
- McCoy, A. Everard, D.F. Galletta, & G. Moody. “Here we Go Again: The impact of Website Ad Repetition on Recall, Intrusiveness, Attitudes, and Site Revisit Intentions,” Information & Management, Vol. 54, Issue 1, Jan. 2017, pp. 14-24.
Kemerer, C., B. K. Dunn & S. Janansefat, “Winners-Take-Some Dynamics in Digital Platform Markets: A Reexamination of the Video Game Console Wars”, working paper, 2017.
Eargle, D., Galletta, Dennis F., & Jenkins, Jeffrey L., “What’s it (cybersecurity) worth to you? Applying risk tradeoff paradigms to explain user interactions with interruptive security messages” (2016). WISP 2016 Proceedings. 14
Eargle, D., Galletta, D.F., Vance, A., Jenkins, J., & Kirwan, B. “Integrating Facial Cues of Threat into Security Warnings – An fMRI and Field Study,” Americas Conference on Information Systems, August, 2016.
Moody, G D, Kirsch, L J, Slaughter, S A, Dunn, B K, & Weng, Q. (2016). Facilitating the Transformational: An Exploration of Control in Cyberinfrastructure Projects and the Discovery of Field Control. Information Systems Research, pp. 324-346.
Boss, Scott, Galletta, D.F., Lowry, P.B., Moody, G.D., & Polak, P., What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors in Users, MIS Quarterly, 39(4), pp. 837-864, December 2015.
Galletta, D.F. & Dunn, B. K. (December 2014) “Assessing Smartphone Ease of Use and Learning from the Perspective of Novice and Expert Users,” AIS Transactions on Human-Computer Interaction.
Moody, G. & Galletta, D.F. “Lost in Cyberspace: The Impact of Information Scent and Time Constraints on Stress, Performance, and Attitudes,” Journal of MIS, 32(1), 2015, pp. 192-224
Mu, E, Kirsch, L. J., & Butler, B. S. (2015). The assimilation of enterprise information system: an interpretation systems perspective. Information & Management, 52(3), 359-370.
Chung, R. & Galletta, D. “Assessing the Genetic Basis of Susceptibility to Security Threats,” SIG-HCI Workshop, Milan, Italy, December 2013 (nominated for best paper)
MacCormack, A., Dunn, B., & Kemerer, C., “Barnes & Noble: Managing the E-Book Revolution,” Harvard Business School Case 613073-PDF-ENG, March 5, 2013.
Lowry, P.B., Moody, G.D., Gaskin, J., Galletta, D.F., Humpherys, Sean, Barlow, J., & Wilson, D., “Evaluating Journal Quality and the Association for Information Systems (AIS) Senior Scholars’ Journal Basket via Bibliometric Measures: Do Expert Journal Assessments Add Value?” MIS Quarterly, Dec 2013, pp. 993-1012.
Lowry, P.B., Moody, G.D., Galletta, D.F., & Vance, A., “Drivers of Online Whistle-Blowing Reporting Systems Use,” Journal of MIS, Summer, 2013, pp. 153-190.
Kemerer, C., C. Liu & M. Smith, “Strategies for Tomorrow’s “Winners-Take-Some” Digital Goods Markets,” Communications of the ACM, v. 56, n. 5, pp. 76-82, May 2013.
MacCormack, A., Dunn, B., & Kemerer, C., “Research in Motion: The Mobile OS Platform War,” Harvard Business School Case 613001-PDF-ENG, July 16, 2012.