Ali Vedadi
Cited by
Cited by
Can Secure Behaviors Be Contagious? A Two-Stage Investigation of the Influence of Herd Behavior on Security Decisions
A Vedadi, M Warkentin
Journal of the Association for Information Systems 21 (2), 428-459, 2020
Herd behavior in information security decision-making
A Vedadi, M Warkentin, A Dennis
Information & Management 58 (8), 103526, 2021
A Quantitative Textual Analysis of Three Types of Threat Communication and Subsequent Maladaptive Responses
K Marett, A Vedadi, A Durcikova
Computers & Security 80, 25-35, 2018
Continuance Intention on Using Mobile Banking Applications: A Replication Study of Information Systems Continuance Model
A Vedadi, M Warkentin
AIS Transactions on Replication Research 2, 1-11, 2016
Business process reengineering in public sector: ranking the implementation barriers
AR Ghatari, Z Shamsi, A Vedadi
International Journal of Process Management and Benchmarking 4 (3), 324-341, 2014
Revisiting how perceived uncertainty and herd behavior influence technology choice
A Vedadi, TH Greer
Journal of Organizational and End User Computing (JOEUC) 33 (6), 1-19, 2021
Secure Behavior over Time: Perspectives from the Theory of Process Memory
A Vedadi, M Warkentin
ACM SIGMIS Database: the Data Base for Advances in Information Systems 49 (1 …, 2018
The Relationship Between Intention to Use, Popularity Information About a Technology, and Trust in Predecessors and Vendors
A Vedadi, TH Greer
Information Resources Management Journal (IRMJ) 34 (1), 43-65, 2021
Continuous Secure Behavior from Process Memory Model Perspective
A Vedadi
Americas Conference on Information Systems (San Diego, CA), 2016
Nudging toward the herd: Understanding the multidimensional role of perceived uncertainty
A Vedadi, T Greer
The Human-Information-Processor Model View of e-Government
M Ndicu, A Vedadi
Americas Conference on Information Systems (San Juan, Puerto Rico), 2015
Detecting deception in computer-mediated communication: the role of popularity information across media types
A Mirsadikov, A Vedadi, K Marett
Information & Computer Security, 2024
Investigating the role of internal security resources in post-adoption satisfaction with the Security-as-a-Service model: an organizational mindfulness perspective
A Vedadi, N Brooks, T Greer
Journal of Enterprise Information Management, 2023
An empirical analysis of the factors driving organizational satisfaction with security-as-a-service.
A Vedadi, T Greer, N Brooks
Journal of Information System Security 19 (1), 2023
Cyber-complacency and the security downfall: An empirical analysis
A Vedadi, S Farshadkhah
22nd Annual Security Conference (Las Vegas, NV), 2023
Understanding the Role of Using Emojis in Deception Detection in Computer-Mediated Communication
A Mirsadikov, A Vedadi, A Muthitacharoen
Americas Conference on Information Systems (Minneapolis, MN), 2022
Detecting Deception in Computer Mediated Communication: Understanding the Role of Popularity Information and Media
A Mirsadikov, A Vedadi
Americas Conference on Information Systems (Salt Lake City, UT), 2020
Toward understanding the dynamic nature of privacy trade-offs
S Xiao, Vedadi, Ali
Proceedings of Dewald Roode Information Security Workshop, Bossier City, LA., 2019
Unpleasant Updates: Discussing Negative Project Performance with Executives
A Vedadi, M Erskine, M Korzaan
ICIS Workshop, 2018
Investigating the Influence of Herd Behavior on Protection Motivation: A Multi-Stage Experiment
A Vedadi
The system can't perform the operation now. Try again later.
Articles 1–20