Can Secure Behaviors Be Contagious? A Two-Stage Investigation of the Influence of Herd Behavior on Security Decisions A Vedadi, M Warkentin Journal of the Association for Information Systems 21 (2), 428-459, 2020 | 77 | 2020 |
Herd behavior in information security decision-making A Vedadi, M Warkentin, A Dennis Information & Management 58 (8), 103526, 2021 | 40 | 2021 |
Continuance Intention on Using Mobile Banking Applications: A Replication Study of Information Systems Continuance Model A Vedadi, M Warkentin AIS Transactions on Replication Research 2, 1-11, 2016 | 22 | 2016 |
Business process reengineering in public sector: ranking the implementation barriers AR Ghatari, Z Shamsi, A Vedadi International Journal of Process Management and Benchmarking 4 (3), 324-341, 2014 | 22 | 2014 |
A Quantitative Textual Analysis of Three Types of Threat Communication and Subsequent Maladaptive Responses K Marett, A Vedadi, A Durcikova Computers & Security 80, 25-35, 2018 | 21 | 2018 |
Revisiting how perceived uncertainty and herd behavior influence technology choice A Vedadi, TH Greer Journal of Organizational and End User Computing (JOEUC) 33 (6), 1-19, 2021 | 16 | 2021 |
Secure Behavior over Time: Perspectives from the Theory of Process Memory A Vedadi, M Warkentin ACM SIGMIS Database: the Data Base for Advances in Information Systems 49 (1 …, 2018 | 13 | 2018 |
The Relationship Between Intention to Use, Popularity Information About a Technology, and Trust in Predecessors and Vendors A Vedadi, TH Greer Information Resources Management Journal (IRMJ) 34 (1), 43-65, 2021 | 3 | 2021 |
Nudging toward the herd: Understanding the multidimensional role of perceived uncertainty A Vedadi, T Greer | 2 | 2020 |
Continuous Secure Behavior from Process Memory Model Perspective A Vedadi Americas Conference on Information Systems (San Diego, CA), 2016 | 2 | 2016 |
Fostering information security compliance as organizational citizenship behavior A Vedadi, M Warkentin, DW Straub, J Shropshire Information & Management 61 (5), 103968, 2024 | 1 | 2024 |
Detecting deception in computer-mediated communication: the role of popularity information across media types A Mirsadikov, A Vedadi, K Marett Information & Computer Security 32 (3), 378-401, 2024 | 1 | 2024 |
The Human-Information-Processor Model View of e-Government M Ndicu, A Vedadi Americas Conference on Information Systems (San Juan, Puerto Rico), 2015 | 1 | 2015 |
Virtual Lies and Digital Truths: A Review of Research on Deception in Online Communication A Mirsadikov, A Nehme, A Vedadi, K Marett Foundations and Trends® in Information Systems 7 (3), 253-309, 2024 | | 2024 |
Linguistic-Based Deception Detection in Computer-Mediated Communication Using Eye-Tracking A Mirsadikov, A Vedadi | | 2024 |
Investigating the role of internal security resources in post-adoption satisfaction with the Security-as-a-Service model: an organizational mindfulness perspective A Vedadi, N Brooks, T Greer Journal of Enterprise Information Management, 2023 | | 2023 |
An empirical analysis of the factors driving organizational satisfaction with security-as-a-service. A Vedadi, T Greer, N Brooks Journal of Information System Security 19 (1), 2023 | | 2023 |
Cyber-complacency and the security downfall: An empirical analysis A Vedadi, S Farshadkhah 22nd Annual Security Conference (Las Vegas, NV), 2023 | | 2023 |
Understanding the Role of Using Emojis in Deception Detection in Computer-Mediated Communication A Mirsadikov, A Vedadi, A Muthitacharoen Americas Conference on Information Systems (Minneapolis, MN), 2022 | | 2022 |
Detecting Deception in Computer Mediated Communication: Understanding the Role of Popularity Information and Media A Mirsadikov, A Vedadi Americas Conference on Information Systems (Salt Lake City, UT), 2020 | | 2020 |