Follow
Alexander McLeod
Title
Cited by
Cited by
Year
Why do college students cheat?
MG Simkin, A McLeod
Journal of business ethics 94, 441-453, 2010
3842010
Cyber-analytics: Modeling factors associated with healthcare data breaches
A McLeod, D Dolezel
Decision Support Systems 108, 57-68, 2018
1782018
Do health information technology investments impact hospital financial performance and productivity?
T Wang, Y Wang, A McLeod
International Journal of Accounting Information Systems 28, 1-13, 2018
1122018
Why don't more students major in IS?
WL Kuechler, A McLeod, MG Simkin
Decision Sciences Journal of Innovative Education 7 (2), 463-488, 2009
1062009
Why don't more women major in information systems?
D Croasdell, A McLeod, MG Simkin
Information Technology & People 24 (2), 158-183, 2011
1002011
Privacy and biometrics: An empirical examination of employee concerns
D Carpenter, A McLeod, C Hicks, M Maasberg
Information Systems Frontiers 20, 91-110, 2018
672018
Individual taxpayer intention to use tax preparation software: Examining experience, trust, and perceived risk
A McLeod, S Pippin, R Mason
Proceedings of ISOneWorld Conference 2 (4), 1-16, 2008
672008
Refining technology threat avoidance theory
D Carpenter, DK Young, P Barrett, AJ McLeod
Communications of the Association for Information Systems 44, 2019
642019
ERP Simulation Effects on Knowledge and Attitudes of Experienced Users
K Deranek, A McLeod, E Schmidt
Journal of Computer Information Systems, 2017
492017
Malware avoidance motivations and behaviors: A technology threat avoidance replication
DK Young, D Carpenter, A McLeod
AIS Transactions on Replication Research 2 (1), 8, 2016
442016
Big data analytics in healthcare: Investigating the diffusion of innovation
D Dolezel, A McLeod
Perspectives in health information management 16 (Summer), 2019
402019
The ethics of predatory journals
A McLeod, A Savage, MG Simkin
Journal of Business Ethics 153, 121-131, 2018
392018
Security and privacy trust in e-government: Understanding system and relationship trust antecedents
AJ McLeod, SE Pippin
2009 42nd Hawaii International Conference on System Sciences, 1-10, 2009
372009
Ghostwriters in the cloud
E Fisher, AJ McLeod, A Savage, MG Simkin
Journal of Accounting Education 34, 59-71, 2016
352016
Using technology acceptance theory to model individual differences in tax software use
A McLeod, S Pippin, V Catania
282009
Factors associated with health insurance literacy: proficiency in finding, selecting, and making appropriate decisions
O Adepoju, A Mask, A McLeod
Journal of Healthcare Management 64 (2), 79-89, 2019
272019
Examining the adoption of big data and analytics curriculum
AJ McLeod, M Bliemel, N Jones
Business Process Management Journal 23 (3), 506-517, 2017
262017
Information security policy non-compliance: Can capitulation theory explain user behaviors?
A McLeod, D Dolezel
Computers & Security 112, 102526, 2022
252022
Refining the threat calculus of technology threat avoidance theory
S Boysen, B Hewitt, D Gibbs, A McLeod
Communications of the Association for Information Systems 45 (1), 5, 2019
252019
Using stakeholder analysis to identify users in healthcare information systems research: who is the real user?
AJ McLeod Jr, JG Clark
International Journal of Healthcare Information Systems and Informatics …, 2009
252009
The system can't perform the operation now. Try again later.
Articles 1–20