Why do college students cheat? MG Simkin, A McLeod Journal of business ethics 94, 441-453, 2010 | 385 | 2010 |
Cyber-analytics: Modeling factors associated with healthcare data breaches A McLeod, D Dolezel Decision Support Systems 108, 57-68, 2018 | 179 | 2018 |
Do health information technology investments impact hospital financial performance and productivity? T Wang, Y Wang, A McLeod International Journal of Accounting Information Systems 28, 1-13, 2018 | 113 | 2018 |
Why don't more students major in IS? WL Kuechler, A McLeod, MG Simkin Decision Sciences Journal of Innovative Education 7 (2), 463-488, 2009 | 106 | 2009 |
Why don't more women major in information systems? D Croasdell, A McLeod, MG Simkin Information Technology & People 24 (2), 158-183, 2011 | 100 | 2011 |
Privacy and biometrics: An empirical examination of employee concerns D Carpenter, A McLeod, C Hicks, M Maasberg Information Systems Frontiers 20, 91-110, 2018 | 69 | 2018 |
Individual taxpayer intention to use tax preparation software: Examining experience, trust, and perceived risk A McLeod, S Pippin, R Mason Proceedings of ISOneWorld Conference 2 (4), 1-16, 2008 | 68 | 2008 |
Refining technology threat avoidance theory D Carpenter, DK Young, P Barrett, AJ McLeod Communications of the Association for Information Systems 44, 2019 | 64 | 2019 |
ERP Simulation Effects on Knowledge and Attitudes of Experienced Users K Deranek, A McLeod, E Schmidt Journal of Computer Information Systems, 2017 | 49 | 2017 |
Malware avoidance motivations and behaviors: A technology threat avoidance replication DK Young, D Carpenter, A McLeod AIS Transactions on Replication Research 2 (1), 8, 2016 | 44 | 2016 |
Big data analytics in healthcare: Investigating the diffusion of innovation D Dolezel, A McLeod Perspectives in health information management 16 (Summer), 2019 | 43 | 2019 |
The ethics of predatory journals A McLeod, A Savage, MG Simkin Journal of Business Ethics 153, 121-131, 2018 | 40 | 2018 |
Security and privacy trust in e-government: Understanding system and relationship trust antecedents AJ McLeod, SE Pippin 2009 42nd Hawaii International Conference on System Sciences, 1-10, 2009 | 38 | 2009 |
Ghostwriters in the cloud E Fisher, AJ McLeod, A Savage, MG Simkin Journal of Accounting Education 34, 59-71, 2016 | 35 | 2016 |
Factors associated with health insurance literacy: proficiency in finding, selecting, and making appropriate decisions O Adepoju, A Mask, A McLeod Journal of Healthcare Management 64 (2), 79-89, 2019 | 28 | 2019 |
Using technology acceptance theory to model individual differences in tax software use A McLeod, S Pippin, V Catania | 28 | 2009 |
Refining the threat calculus of technology threat avoidance theory S Boysen, B Hewitt, D Gibbs, A McLeod Communications of the Association for Information Systems 45 (1), 5, 2019 | 26 | 2019 |
Examining the adoption of big data and analytics curriculum AJ McLeod, M Bliemel, N Jones Business Process Management Journal 23 (3), 506-517, 2017 | 26 | 2017 |
Information security policy non-compliance: Can capitulation theory explain user behaviors? A McLeod, D Dolezel Computers & Security 112, 102526, 2022 | 25 | 2022 |
Mobile device security: Perspectives of future healthcare workers B Hewitt, D Dolezel, A McLeod Jr Perspectives in health information management 14 (Winter), 2017 | 25 | 2017 |