default search action
Sigi Goode
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j28]Sigi Goode:
Users in crisis response and recovery: catharsis and social learning among social media users during and after a natural disaster. Behav. Inf. Technol. 42(1): 108-123 (2023) - 2022
- [j27]Sigi Goode, David Lacey:
Exploiting organisational vulnerabilities as dark knowledge: conceptual development from organisational fraud cases. J. Knowl. Manag. 26(6): 1492-1515 (2022) - 2021
- [j26]Mark Khai Shean Tan, Sigi Goode, Alex Richardson:
Understanding negotiated anti-malware interruption effects on user decision quality in endpoint security. Behav. Inf. Technol. 40(9): 903-932 (2021) - 2020
- [j25]Sigi Goode:
Preface to the Special Section on the 10th Information Systems Foundations Workshop. Australas. J. Inf. Syst. 24 (2020) - [j24]Sigi Goode:
Confront, Accept or Reinterpret? Coping Mediation Effects on Attribution in Cloud Service Failure. J. Organ. Comput. Electron. Commer. 30(4): 335-360 (2020)
2010 – 2019
- 2019
- [j23]Sigi Goode:
Keeping the user in the cloud: a cognitive social capital antecedent to use continuance and trust-commitment in personal cloud storage services. Behav. Inf. Technol. 38(7): 701-725 (2019) - 2018
- [c15]Sigi Goode:
Keeping the User in the Cloud: A Cognitive Social Capital Antecedent to Use Continuance and Service Commitment. PACIS 2018: 35 - 2017
- [j22]Sigi Goode, Hartmut Hoehle, Viswanath Venkatesh, Susan A. Brown:
User Compensation as a Data Breach Recovery Action: An Investigation of the Sony PlayStation Network Breach. MIS Q. 41(3): 703-727 (2017) - [c14]Sigi Goode, David Lacey:
Designing and evaluating two interventions to improve identity theft recovery outcomes. ISTAS 2017: 1-6 - 2015
- [j21]Sigi Goode, Chinho Lin, Jacob C. Tsai, James J. Jiang:
Rethinking the role of security in client satisfaction with Software-as-a-Service (SaaS) providers. Decis. Support Syst. 70: 73-85 (2015) - 2014
- [j20]Sigi Goode, Chinho Lin, Walter D. Fernández, James J. Jiang:
Exploring two explanations of loyalty in application service provision. Eur. J. Oper. Res. 237(2): 649-657 (2014) - [j19]Sigi Goode, Gregory Shailer, Mark Wilson, Jaroslaw Jankowski:
Gifting and Status in Virtual Worlds. J. Manag. Inf. Syst. 31(2): 171-210 (2014) - 2013
- [c13]Sigi Goode:
Switching Propensity in Single-Homing and Multi-Homing Cloud Service Relationships. ACIS 2013: 98 - 2012
- [j18]Sigi Goode, Anastasiou Kartas:
Exploring software piracy as a factor of video game console adoption. Behav. Inf. Technol. 31(6): 547-563 (2012) - [j17]Anastasiou Kartas, Sigi Goode:
Use, perceived deterrence and the role of software piracy in video game console adoption. Inf. Syst. Frontiers 14(2): 261-277 (2012) - [j16]Hartmut Hoehle, Sid Huff, Sigi Goode:
The Role of Continuous Trust in Information Systems Continuance. J. Comput. Inf. Syst. 52(4): 1-9 (2012) - 2011
- [j15]Sigi Goode, David Lacey:
Detecting complex account fraud in the enterprise: The role of technical and non-technical controls. Decis. Support Syst. 50(4): 702-714 (2011) - [c12]Sigi Goode, David Lacey:
Exploring information security controls using information fraud episodes: case study evidence from a large telecommunications firm. ECIS 2011: 241 - [c11]Sigi Goode, David Lacey:
Exploring Interpersonal Relationships in Security Information Sharing. ICIS 2011 - 2010
- [j14]Sigi Goode:
Exploring the supply of pirate software for mobile devices: An analysis of software types and piracy groups. Inf. Manag. Comput. Secur. 18(4): 204-225 (2010) - [j13]Dayne Frost, Sigi Goode, Dennis Hart:
Individualist and collectivist factors affecting online repurchase intentions. Internet Res. 20(1): 6-28 (2010) - [j12]Walter D. Fernández, Sigi Goode, Miranda Robinson:
Uneasy Alliances: Tradition and ICT Transformation in the Value Chain. J. Organ. Comput. Electron. Commer. 20(3): 234-256 (2010)
2000 – 2009
- 2009
- [j11]Sigi Goode, Shirley Gregor:
Rethinking organisational size in IS research: meaning, measurement and redevelopment. Eur. J. Inf. Syst. 18(1): 4-25 (2009) - [j10]Sacha Plowman, Sigi Goode:
Factors Affecting the Intention to Download Music: Quality Perceptions and Downloading Intensity. J. Comput. Inf. Syst. 49(4): 84-97 (2009) - [c10]Sigi Goode, David Lacey:
Social Embeddedness and Sharing Security Information: Bridging the Cost Benefit Gap. ACIS 2009 - 2007
- [j9]Sigi Goode, Robert A. Willis, James R. Wolf, Albert L. Harris:
Enhancing IS Education with Flexible Teaching and Learning. J. Inf. Syst. Educ. 18(3): 297-302 (2007) - [c9]Manning Li, Shirley Gregor, Sigi Goode:
Developing a Model for Government Service Delivery Through Intelligent Support Systems (ISS). ACIS 2007 - 2005
- [j8]Sigi Goode:
A Longitudinal Study of ISP Reactions to Australian Internet Content Regulation Laws. Australas. J. Inf. Syst. 13(1) (2005) - [j7]Sigi Goode:
Something for nothing: management rejection of open source software in Australia's top firms. Inf. Manag. 42(5): 669-681 (2005) - [j6]Sigi Goode, Seng-Thiam Teh:
Teaching Tip: Peer Review to Support Assessment in Teams. J. Inf. Syst. Educ. 16(4): 379-383 (2005) - 2004
- [c8]Steven E. Stern, Shirley Gregor, Michael A. Martin, Sigi Goode, John Rolfe:
A classification tree analysis of broadband adoption in Australian households. ICEC 2004: 451-456 - [c7]Sam Cruise, Sigi Goode:
What Motivates Software Crackers? ACIS 2004 - [c6]Dennis Hart, Sigi Goode:
Understanding Data and Information Sharing in Organizations: A Value-Based Approach. ACIS 2004 - [c5]Sigi Goode:
A Concept Map of the Organisational Size Construct in Information Systems Research. PACIS 2004: 127 - 2003
- [j5]Carlo Cappuccio, Sigi Goode:
Australian Business After the Dotcom Bubble: Initial Findings. J. Res. Pract. Inf. Technol. 35(1): 3-6 (2003) - [j4]Sigi Goode:
Regulating the Information Society: Initial ISP Reactions to Australian Internet Content Legislation. J. Comput. Inf. Syst. 43(2): 9-15 (2003) - [c4]Alex Berrill, Sigi Goode, Dennis Hart:
Managerial Expectations Regarding Internet Commerce Adoption after the "Tech Wreck" of 2000 - An Australian Perspective. PACIS 2003: 10 - 2002
- [j3]Sigi Goode:
Exploratory Analysis of the Effect of Consultants on the Use of World Wide Web Sites in SMEs. Australas. J. Inf. Syst. 10(1) (2002) - [j2]Sigi Goode:
Management Attitudes Toward the World Wide Web in Australian Small Business. Inf. Syst. Manag. 19(1): 45-48 (2002) - [c3]Carlo Cappuccio, Sigi Goode, Sumit K. Lodhia:
Ex-ante and Ex-post Ecommerce Evaluation: current status and directions for future research. ACIS 2002 - [c2]Colin Freeman, Sigi Goode:
Entry Into The Information Society : The View From Tajikistan. ECIS 2002: 1249-1260 - 2001
- [c1]Sigi Goode:
Organisational Size Metrics in IS Research: A Critical Survey of the Literature 1989 - 2000. ACIS 2001 - 2000
- [j1]Sigi Goode, Kenneth Stevens:
An analysis of the business characteristics of adopters and non-adopters of World Wide Web technology. Inf. Technol. Manag. 1(1-2): 129-154 (2000)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:10 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint