Sigi Goode

According to our database1, Sigi Goode authored at least 37 papers between 2000 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Users in crisis response and recovery: catharsis and social learning among social media users during and after a natural disaster.
Behav. Inf. Technol., January, 2023

2022
Exploiting organisational vulnerabilities as dark knowledge: conceptual development from organisational fraud cases.
J. Knowl. Manag., 2022

2021
Understanding negotiated anti-malware interruption effects on user decision quality in endpoint security.
Behav. Inf. Technol., 2021

2020
Confront, Accept or Reinterpret? Coping Mediation Effects on Attribution in Cloud Service Failure.
J. Organ. Comput. Electron. Commer., 2020

Preface to the Special Section on the 10th Information Systems Foundations Workshop.
Australas. J. Inf. Syst., 2020

2019
Keeping the user in the cloud: a cognitive social capital antecedent to use continuance and trust-commitment in personal cloud storage services.
Behav. Inf. Technol., 2019

2018
Keeping the User in the Cloud: A Cognitive Social Capital Antecedent to Use Continuance and Service Commitment.
Proceedings of the 22nd Pacific Asia Conference on Information Systems, 2018

2017
User Compensation as a Data Breach Recovery Action: An Investigation of the Sony PlayStation Network Breach.
MIS Q., 2017

Designing and evaluating two interventions to improve identity theft recovery outcomes.
Proceedings of the 2017 IEEE International Symposium on Technology and Society, 2017

2015
Rethinking the role of security in client satisfaction with Software-as-a-Service (SaaS) providers.
Decis. Support Syst., 2015

2014
Gifting and Status in Virtual Worlds.
J. Manag. Inf. Syst., 2014

Exploring two explanations of loyalty in application service provision.
Eur. J. Oper. Res., 2014

2013
Switching Propensity in Single-Homing and Multi-Homing Cloud Service Relationships.
Proceedings of the Australasian Conference on Information Systems, 2013

2012
The Role of Continuous Trust in Information Systems Continuance.
J. Comput. Inf. Syst., 2012

Use, perceived deterrence and the role of software piracy in video game console adoption.
Inf. Syst. Frontiers, 2012

Exploring software piracy as a factor of video game console adoption.
Behav. Inf. Technol., 2012

2011
Detecting complex account fraud in the enterprise: The role of technical and non-technical controls.
Decis. Support Syst., 2011

Exploring Interpersonal Relationships in Security Information Sharing.
Proceedings of the International Conference on Information Systems, 2011

Exploring information security controls using information fraud episodes: case study evidence from a large telecommunications firm.
Proceedings of the 19th European Conference on Information Systems, 2011

2010
Uneasy Alliances: Tradition and ICT Transformation in the Value Chain.
J. Organ. Comput. Electron. Commer., 2010

Individualist and collectivist factors affecting online repurchase intentions.
Internet Res., 2010

Exploring the supply of pirate software for mobile devices: An analysis of software types and piracy groups.
Inf. Manag. Comput. Secur., 2010

2009
Factors Affecting the Intention to Download Music: Quality Perceptions and Downloading Intensity.
J. Comput. Inf. Syst., 2009

Rethinking organisational size in IS research: meaning, measurement and redevelopment.
Eur. J. Inf. Syst., 2009

2007
Enhancing IS Education with Flexible Teaching and Learning.
J. Inf. Syst. Educ., 2007

2005
<i>Teaching Tip</i>: Peer Review to Support Assessment in Teams.
J. Inf. Syst. Educ., 2005

Something for nothing: management rejection of open source software in Australia's top firms.
Inf. Manag., 2005

A Longitudinal Study of ISP Reactions to Australian Internet Content Regulation Laws.
Australas. J. Inf. Syst., 2005

2004
A Concept Map of the Organisational Size Construct in Information Systems Research.
Proceedings of the Pacific Asia Conference on Information Systems, 2004

A classification tree analysis of broadband adoption in Australian households.
Proceedings of the 6th International Conference on Electronic Commerce, 2004

2003
Regulating the Information Society: Initial ISP Reactions to Australian Internet Content Legislation.
J. Comput. Inf. Syst., 2003

Australian Business After the Dotcom Bubble: Initial Findings.
J. Res. Pract. Inf. Technol., 2003

Managerial Expectations Regarding Internet Commerce Adoption after the "Tech Wreck" of 2000 - An Australian Perspective.
Proceedings of the Seventh Pacific Asia Conference on Information Systems, 2003

2002
Management Attitudes Toward the World Wide Web in Australian Small Business.
Inf. Syst. Manag., 2002

Exploratory Analysis of the Effect of Consultants on the Use of World Wide Web Sites in SMEs.
Australas. J. Inf. Syst., 2002

Entry Into The Information Society : The View From Tajikistan.
Proceedings of the 10th European Conference on Information Systems, 2002

2000
An analysis of the business characteristics of adopters and non-adopters of World Wide Web technology.
Inf. Technol. Manag., 2000


  Loading...