Dennis F. Galletta

Orcid: 0000-0003-0442-5500

Affiliations:
  • University of Pittsburgh, PA, USA


According to our database1, Dennis F. Galletta authored at least 88 papers between 1988 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
The Paradox of Choice: Digital Akrasia in the Deployment of Multi-Factor Authentication.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

2022
HARKing and P-Hacking: A Call for More Transparent Reporting of Studies in the Information Systems Field.
Commun. Assoc. Inf. Syst., 2022

2021
Efficiency and Exposure: Reconciling the Effects of Website Browsing Behaviors for Non-transactional Outcomes.
AIS Trans. Hum. Comput. Interact., June, 2021

Emotions: The Unexplored Fuel of Fake News on Social Media.
J. Manag. Inf. Syst., 2021

Special Issue: Fake News on the Internet.
J. Manag. Inf. Syst., 2021

Understanding Inconsistent Employee Compliance with Information Security Policies Through the Lens of the Extended Parallel Process Model.
Inf. Syst. Res., 2021

2020
Regret under different auction designs: the case of English and Dutch auctions.
Electron. Mark., 2020

IS Faculty perspectives on the impacts and implications of the COVID-19 pandemic for IS Teaching and Research.
Proceedings of the 41st International Conference on Information Systems, 2020

2019
Digital Borders, Location Recognition, and Experience Attribution within a Digital Geography.
J. Manag. Inf. Syst., 2019

Predicting the intent of sponsored search users: An exploratory user session-level analysis.
Decis. Support Syst., 2019

If Practice Makes Perfect, Where do we Stand?
Commun. Assoc. Inf. Syst., 2019

The Tangled Web: Studying Online Fake News.
Proceedings of the 40th International Conference on Information Systems, 2019

2018
Bridging a Bridge: Bringing Two HCI Communities Together.
Proceedings of the Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems, 2018

2017
Here we go again! The impact of website ad repetition on recall, intrusiveness, attitudes, and site revisit intentions.
Inf. Manag., 2017

It's complicated: explaining the relationship between trust, distrust, and ambivalence in online transaction relationships using polynomial regression analysis and response surface analysis.
Eur. J. Inf. Syst., 2017

Which phish get caught? An exploratory study of individuals′ susceptibility to phishing.
Eur. J. Inf. Syst., 2017

Goals, Values, and Expectations of the AIS Family of Journals.
Commun. Assoc. Inf. Syst., 2017

2016
Integrating Facial Cues of Threat into Security Warnings - An fMRI and Field Study.
Proceedings of the 22nd Americas Conference on Information Systems, 2016

2015
What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear that Motivate Protective Security Behaviors.
MIS Q., 2015

Lost in Cyberspace: The Impact of Information Scent and Time Constraints on Stress, Performance, and Attitudes Online.
J. Manag. Inf. Syst., 2015

Creating Greater Synergy Between HCI Academia and Practice.
Proceedings of the HCI in Business - Second International Conference, 2015

2014
When trust and distrust collide online: The engenderment and role of consumer ambivalence in online consumer behavior.
Electron. Commer. Res. Appl., 2014

The Value of Competing in Virtual Communities: Use and Exchange Value Creation in Online Auctioning.
Proceedings of the International Conference on Information Systems, 2014

2013
Evaluating Journal Quality and the Association for Information Systems Senior Scholars' Journal Basket Via Bibliometric Measures: Do Expert Journal Assessments Add Value?
MIS Q., 2013

The Drivers in the Use of Online Whistle-Blowing Reporting Systems.
J. Manag. Inf. Syst., 2013

Examining the Potential for Tablet Use in a Higher Education Context.
Proceedings of the 11. Internationale Tagung Wirtschaftsinformatik, 2013

Explaining the Engenderment and Role of Consumer Ambivalence in E-Commerce.
Proceedings of the 17th Pacific Asia Conference on Information Systems, 2013

Development of Smart Phone Usability Benchmarking Tasks.
Proceedings of the 46th Hawaii International Conference on System Sciences, 2013

2012
Factors Influencing the Planned Adoption of Continuous Monitoring Technology.
J. Inf. Syst., 2012

The antecedents of the use of continuous auditing in the internal auditing context.
Int. J. Account. Inf. Syst., 2012

Keyword Search Patterns in Sponsored Link Advertisements.
Proceedings of the International Conference on Information Systems, 2012

Digital Advertising's Human Toll: How Implied Cost-to-User Affects Web Content Platforms (A Research Proposal).
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012

Conceptualizing Knowledge Use: A Theoretical Framework and Empirical Study.
Proceedings of the 45th Hawaii International International Conference on Systems Science (HICSS-45 2012), 2012

A Rational Choice Theory Approach towards a Causal Model of Online Advertising Intrusiveness and irritation.
Proceedings of the 20th European Conference on Information Systems, 2012

2011
Research Note - Knowledge Exploration and Exploitation: The Impacts of Psychological Climate and Knowledge Management System Access.
Inf. Syst. Res., 2011

Which Phish Get Caught? An Exploratory Study of Individual Susceptibility to Phishing.
Proceedings of the International Conference on Information Systems, 2011

Intrusiveness of Online Video Advertising and Its Effects on Marketing Outcomes.
Proceedings of the International Conference on Information Systems, 2011

2009
User Awareness of Security Countermeasures and Its Impact on Information Systems Misuse: A Deterrence Approach.
Inf. Syst. Res., 2009

2008
How Endogenous Motivations Influence User Intentions: Beyond the Dichotomy of Extrinsic and Intrinsic User Motivations.
J. Manag. Inf. Syst., 2008

An Experimental Study of Antecedents and Consequences of Online Ad Intrusiveness.
Int. J. Hum. Comput. Interact., 2008

Sharing knowledge.
Commun. ACM, 2008

I'm Losing Patience with your Site: The Impact of Information Scent and Time Constraints on Effort, Performance, and Attitudes.
Proceedings of the International Conference on Information Systems, 2008

Panel: Encircling the Globe: How can an Association of Information Systems Academics be Truly International?
Proceedings of the 16th European Conference on Information Systems, 2008

2007
Applying TAM across cultures: the need for caution.
Eur. J. Inf. Syst., 2007

The effects of online advertising.
Commun. ACM, 2007

Does Our Web Site Stress You Out? Information Foraging and the Psychophysiology of Online Navigation.
Proceedings of the International Conference on Information Systems, 2007

Online Ad Intrusiveness.
Proceedings of the Human-Computer Interaction. HCI Applications and Services, 2007

2006
Consumer Perceptions and Willingness to Pay for Intrinsically Motivated Online Content.
J. Manag. Inf. Syst., 2006

How Presentation Flaws Affect Perceived Site Quality, Trust, and Intention to Purchase from an Online Store.
J. Manag. Inf. Syst., 2006

When the Wait Isn't So Bad: The Interacting Effects of Website Delay, Familiarity, and Breadth.
Inf. Syst. Res., 2006

The Slippery Slope of MIS Academia: A Discussion of the Quest for Relevance in Our Discipline.
Commun. Assoc. Inf. Syst., 2006

A Dyadic Analysis of Media Synchronicity and Task in Live Chat Online Customer Service (LCOCS).
Proceedings of the Connecting the Americas. 12th Americas Conference on Information Systems, 2006

Toward an Adaptive Structuration Model of International Cyber-Crime.
Proceedings of the Connecting the Americas. 12th Americas Conference on Information Systems, 2006

2005
A Multidimensional Commitment Model of Volitional Systems Adoption and Usage Behavior.
J. Manag. Inf. Syst., 2005

Integrating National Culture into IS Research: The Need for Current Individual Level Measures.
Commun. Assoc. Inf. Syst., 2005

Does spell-checking software need a warning label?
Commun. ACM, 2005

AIS SIGHCI position paper.
Proceedings of the Extended Abstracts Proceedings of the 2005 Conference on Human Factors in Computing Systems, 2005

2004
Web Site Delays: How Tolerant are Users?
J. Assoc. Inf. Syst., 2004

The Role of Human Computer Interaction in Management Information Systems Curricula: A Call to Action.
Commun. Assoc. Inf. Syst., 2004

Building systems that users want to use.
Commun. ACM, 2004

The Role of Organizational Climate in the Use of Knowledge Management Systems to Support Problem Solving.
Proceedings of the 10th Americas Conference on Information Systems, 2004

2003
Individual Centrality and Performance in Virtual R&D Groups: An Empirical Study.
Manag. Sci., 2003

Software Piracy in the Workplace: A Model and Empirical Test.
J. Manag. Inf. Syst., 2003

The Influence of the Meaning of Pictures and Words on Web Page Recognition Performance.
Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS-36 2003), 2003

Role of Commitment and Motivation in Knowledge Management Systems Implementation: Theory, Conceptualization, and Measurement of Antecedents of Success.
Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS-36 2003), 2003

What Leads Us to Share Valuable Knowledge? An Experimental Study of the Effects of Managerial Control, Group Identification, and Social Value Orientation on Knowledge-Sharing Behavior.
Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS-36 2003), 2003

Cognitive Fit and an Intelligent Agent for a Word Processor: Should Users Take All That Advice?
Proceedings of the 36th Hawaii International Conference on System Sciences (HICSS-36 2003), 2003

The Role of Human-Computer Interaction in the Information Systems Curriculum (Panel).
Proceedings of the 9th Americas Conference on Information Systems, 2003

2002
AMCIS 2002 Panels and Workshops I: Human-Computer Interaction Research in the MIS Discipline.
Commun. Assoc. Inf. Syst., 2002

2001
Coming of Age: Special Interest Groups in AIS.
Commun. Assoc. Inf. Syst., 2001

2000
A Strategic Perspective of Internet Information Providers.
Proceedings of the Handbook on Electronic Commerce, 2000

1999
Extending the Technology Acceptance Model to Account for Social Influence: Theoretical Bases and Empirical Validation.
Proceedings of the 32nd Annual Hawaii International Conference on System Sciences (HICSS-32), 1999

1998
An Empirical Validation of a Contingency Model for Information Requirements Determination.
Data Base, 1998

Influencing the success of spreadsheet development by novice users.
Proceedings of the Nineteenth International Conference on Information Systems, 1998

1997
Spreadsheet Presentation and Error Detection: An Experimental Study.
J. Manag. Inf. Syst., 1997

Individual performance in distributed design groups: an empirical study.
Proceedings of the ACM SIGCPR Conference on Computer Personnel Research, 1997

Effects of information uncertainty and equivocality on decision-maker information searching and usage.
Proceedings of the Eighteenth International Conference on Information Systems, 1997

1996
Developing a Predictive Model of Software Piracy Behavior: An Empirical Study.
Proceedings of the Seventeenth International Conference on Information Systems, 1996

An Experimental Study of Spreadsheet Presentation and Error Detection.
Proceedings of the 29th Annual Hawaii International Conference on System Sciences (HICSS-29), 1996

1995
Social Influence and End-User Training.
Commun. ACM, 1995

A preliminary study of the bases of social power in an MIS context.
Proceedings of the 1995 ACM SIGCPR Conference on Supporting Teams, 1995

1994
An Empirical Study of Peer Influence on User Attitudes, Behavior, and Performance.
Proceedings of the Fifteenth International Conference on Information Systems, 1994

1993
The Effect of Expertise on Software Selection.
Data Base, 1993

1992
A model of end-user computing policy: Context, process, content and compliance.
Inf. Manag., 1992

1991
Cognitive Fit: An Empirical Study of Information Acquisition.
Inf. Syst. Res., 1991

1990
A Role Theory Perspective on End-User Development.
Inf. Syst. Res., 1990

MIS Research Directions: A Survey of Researchers' Views.
Data Base, 1990

1988
Changing Roles in is: a Role Theory Perspective.
Proceedings of the 9th International Conference on Information Systems, 1988


  Loading...