Portrait of Dr. Alexander John McLeod

Dr. Alexander John McLeod

  • Professor at McCoy College of Business, McCoy College of Business

Scholarly and Creative Works

2024

  • Turrietta, C., Hewitt, B. A., Moczygemba, J. A., & McLeod, A. J. (2024). HIM Professionals Role to Support Individuals Considering Genetic Testing: An Exploratory Study. Health Information Management Journal, 54(3). https://doi.org/https://doi.org/10.1177/18333583241283518

2023

  • McLeod, A. J., & Dolezel, D. (2023). Security Analytics: Evaluating Antecedents to Non-Compliance Behaviors.

2022

  • Hewitt, B. A., Deranek, K., McLeod, A. J., & Gudi, A. (2022). Exercise Motives Impact on Physical Activities Measured Using Wearable Devices. Health Promotion International, 37(3). https://doi.org/10.1093/heapro/daac071
  • Young, D. K., Carpenter, D., & McLeod, A. J. (2022). Examining the Influence of Occupational Characteristics, Gender, and Work-Life Balance on IT Professionals’ Occupational Satisfaction and Occupational Commitment. Information Technology & People. Retrieved from https://www.emeraldgrouppublishing.com/
  • Fulton, L., Dolezel, D., & McLeod, A. J. (2022). Deep Vision for Breast Cancer Classification and Segmentation.

2021

  • Fulton, L. V., McLeod, A. J., Dolezel, D. M., Bastian, N., & Fulton, C. (2021). Deep Vision for Breast Cancer Classification and Segmentation. Cancers, 13(21), 5384. https://doi.org/10.3390/cancers13215384
  • Fulton, L. V., McLeod, A. J., Bastian, N., & Fulton, C. (2021). Deep Vision for Breast Cancer Classification and Segmentation. Cancers, 13(21), 5384.
  • McLeod, A. J., & Dolezel, D. M. (2021). Information Security Policy Non-Compliance: Can Capitulation Theory Explain User Behaviors? Computers & Security, 11, 112. https://doi.org/10.1016/j.cose.2021.102526
  • McLeod, A. J., & Dolezel, D. M. (2021). Security Policy Non-Compliance: Can Capitulation Theory Explain User Behaviors? Computers & Security. Retrieved from https://www.journals.elsevier.com/computers-and-security
  • Dolezel, D. M., McLeod, A., & Fulton, L. (2021). Examining Predictors of Myocardial Infarction. International Journal of Environmental Research and Public Health, 18(21), 11284. https://doi.org/10.3390/ijerph182111284.
  • Fulton, L. V., Adepoju, L., Dolezel, D. M., Ekin, T., Gibbs, D. L., Hewitt, B. A., … Woodard, L. (2021). Determinants of Diabetes Disease Management, 2011-2019. Healthcare, 9(994).
  • Fulton, L. V., Adepoju, L., Dolezel, D. M., Ekin, T., Gibbs, D. L., Hewitt, B. A., … Woodard, L. (2021). Determinants of Diabetes Disease Management, 2011-2019. Healthcare, 9(994).
  • Fulton, L. V., Adepoju, L., Dolezel, D. M., Ekin, T., Gibbs, D. L., Hewitt, B. A., … Woodard, L. (2021). Determinants of Diabetes Disease Management, 2011-2019. Healthcare, 9(8), 944. https://doi.org/10.3390/healthcare9080944
  • Johnston, R., Hewitt, B. A., Moczygemba, J. A., & McLeod, A. J. (2021). Examining Individual Transition from Healthcare to Information Technology Roles Using the Theory of Planned Behavior. Perspectives in Health Information Management, 18(Spring).
  • Toth, E. G., Gibbs, D., Moczygemba, J., & McLeod, A. J. (2021). Decision tree modeling in R software to aid clinical decision making. Health and Technology, 11(3), 535–545. https://doi.org/10.1007/s12553-021-00542-w

2020

  • Hewitt, B., Walz, D., & McLeod, A. J. (2020). The Effect of Conflict and Knowledge Sharing on the Performance of Information Technology Project Teams. International Journal of Knowledge Management, 16(1). https://doi.org/10.4018/IJKM.2020010101
  • Young, D. K., McLeod, A. J., & Carpentar, D. (2020). A Conceptual Replication of the Unified Model of Information Security Policy Compliance. AIS Transactions on Replication Research, 6(1). Retrieved from https://aisel.aisnet.org/trr/vol6/iss1/7/
  • Dolezel, D., & McLeod, A. J. (2020). Big Data Skills: Bridging the Data Science Theory-Practice Gap. Perspectives in Health Information Management, 18(Winter), 1–18. Retrieved from https://www.ncbi.nlm.nih.gov/pmc/articles/PMC7883353/
  • Beesley, K., Moczygemba, J. A., Hewitt, B. A., & McLeod, A. J. (2020). Health Information Management Reimagined: Assessing Current Professional Skills and Industry Demand. Perspectives in Health Information Management.
  • McLeod, A. J., & Dolezel, D. M. (2020). Toward Capitulation Theory. Atlanta, GA, U.S.: Association for Information Systems.
  • Deranek, K., Hewitt, B. A., Gudi, A., & McLeod, A. J. (2020). The Impact of Exercise Motives on the Sustained Use of Wearable Technology. Behaviour & Information Technology. https://doi.org/10.1080/0144929X.2020.1720295

2019

  • Carpenter, D., Young, D., Barrett, P., & McLeod, A. (2019). Refining Technology Threat Avoidance Theory. Communications of the Association for Information Systems, 44.
  • Boysen, S. D. D., Hewitt, B. A., Gibbs, D. L., & McLeod, A. J. (2019). Refining the Threat Calculus of Technology Threat Avoidance Theory. Communications of the Association for Information Systems, 45, 95–115. https://doi.org/10.17705/1CAIS.04505
  • Dolezel, D., & McLeod, A. J. (2019). Managing Security Risk: Modeling the Root Causes of Data Breaches. The Health Care Manager, 38(4), 322–330. https://doi.org/10.1097/HCM.0000000000000282
  • Dolezel, D., & McLeod, A. J. (2019). Big Data Analytics in Healthcare: Investigating the Diffusion of Innovation. Perspectives in Health Information Management, 16(Summer), 1–19. Retrieved from https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6669368/
  • Dolezel, D., & McLeod, A. J. (2019). Cyber-Analytics: Identifying Discriminants of Data Breaches. Perspectives in Health Information Management, 16(Summer), 1–17. Retrieved from https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6669366/
  • Odepoju, O., Mask, A., & McLeod, A. (2019). Factors associated with health insurance literacy: how proficient individuals are in finding, selecting and making appropriate health insurance decisions. Journal of Healthcare Management, 64(2).
  • Deranek, K., Gudi, A. G., Hewitt, B. A., & McLeod, A. J. (2019). Adolescents’ Exercise Motives Impact on Use Adherence of Wearable Technology. In Southeast Decision Science Institute.

2018

  • McLeod, A. J., & Dolezel, D. M. (2018). Cyber Analytics: Modeling Factors Associated with Healthcare Data Breaches. Decision Support Systems and Electronic Commerce, 108(218), 57–68. https://doi.org/10.1016/j.dss.2018.02.007
  • Carpenter, D., Young, D., McLeod, A. J., & Maasberg, M. (2018). IT Career Counseling: Are Occupational Congruence and the Job Characteristics Model Effective at Predicting IT Job Satisfaction? Journal of Information Systems Education, 29(4).
  • McLeod, A., & Adepoju, O. (2018). Toward a Health Insurance Literacy Model: What Do Young Consumers Know About Health Insurance? Perspectives in Health Information Management, Fall 2018.
  • McLeod, A. J., & Dolezel, D. M. (2018). Understanding Healthcare Data Breaches: Crafting Security Profiles (pp. 1–9). Association for Information Systems.
  • Topinka, J. B., Hewitt, B. A., McLeod, A. J., & Kruse, C. S. (2018). Healthy Students 2020: Analysis of a Self-Reported Health Assessment in a Public Four-Year University. Texas Public Health Journal, 70(2), 16–22.
  • Wang, T., Wang, Y., & McLeod, A. J. (2018). Do investments in health information technology impact hospital financial performance? International Journal of Accounting Information Systems, 28, 1–13. Retrieved from https://doi.org/10.1016/j.accinf.2017.12.002

2017

  • McLeod, A., Bliemel, M., & Jones, N. (2017). Examining the Adoption of Big Data and Analytics Curriculum. Business Process Management Journal, 23(3). https://doi.org/http://dx.doi.org/10.1108/BPMJ-12-2015-0174
  • Hewitt, B., Dolezel, D., & McLeod, A. (2017). Mobile Device Security: Perspectives of Future Healthcare Workers. Perspectives in Health Information Management, 14(Winter), 1–14. Retrieved from http://perspectives.ahima.org/
  • Deranek, K., McLeod, A., & Schmidt, E. (2017). ERP Simulation Effects on Knowledge and Attitudes of Experienced Users. Journal of Computer Information Systems. Retrieved from http://www.tandfonline.com/loi/ucis20
  • Gibbs, D., McLeod, A., & Lalani, K. (2017). Beware the Internet’s Dark Side: What HIM Professionals and Patients Should Know About the Dark Web. Journal of American Health Information Management Association, 88(8), 30-33,52. Retrieved from https://bok.ahima.org/doc?oid=302209#.Xv0hB-d7mUk
  • Murphy-Abdouch, K., Dolezel, D., & McLeod, A. (2017). Patient Access to Personal Health Information: An Analysis of the Consumer’s Perspective. Perspectives in Health Informatics and Information Management, Summer, 1–19. Retrieved from http://perspectives.ahima.org/
  • Adepoju, L., Mask, A., & McLeod, A. (2017). Health Insurance Literacy as a Determinant of Population Health. Population Health Management, July. Retrieved from http://www.liebertpub.com/overview/population-health-management/301/
  • Young, D., Carpenter, D., Massberg, M., & McLeod, A. (2017). Predicting IT Job Satisfaction: Occupational Congruence and the Job Characteristics Model. Retrieved from http://amcis2017.aisnet.org/
  • McLeod, A., Hewitt, B., Gibbs, D., & Kristof, C. (2017). Evaluating Motivation for the Use of an Electronic Health Record Simulation Game. Perspectives in Health Information Management, Spring, 1–19. Retrieved from http://perspectives.ahima.org/evaluatingmotivation/

2016

  • Young, D., Carpenter, D., & McLeod, A. (2016). Malware Avoidance Motivations and Behaviors: A Technology Threat Avoidance Replication. AIS Transactions on Replication Research, 2. Retrieved from http://aisel.aisnet.org/trr/
  • McLeod, A., Simkin, M., & Week, J. (2016). Toward the User-Commitment Continuum: Establishing the Importance of Realisation. International Journal of Learning Technology, 11(2), 134–155. https://doi.org/10.1504/IJLT.2016.077521
  • Carpenter, D., McLeod, A., Massberg, M., & Hickey, C. (2016). Privacy and Biometrics: An Empirical Examination of Employee Concerns. Information System Frontiers, June. https://doi.org/10.1007/s10796-016-9667-5
  • Dolezel, D., & McLeod, A. (2016). The Odds of Success: Predicting Registered Health Information Administrator Exam Success. Perspectives in Health Information Management, 14(Winter), 1–21.
  • McLeod, A., Savage, A., & Simkin, M. (2016). The Ethics of Predatory Journals. Journal of Business Ethics. Retrieved from http://www.springer.com/philosophy/ethics+and+moral+philosophy/journal/10551
  • Dolezel, D., McLeod, A., & Clisbee, M. (2016). Master of Health Information Management Students’ First-Year Experiences: A Case Study. Educational Perspectives in Health Information Management, Fall, 1–15.
  • Gibbs, D., Hewitt, B., & McLeod, A. (2016). The Gamification of Electronic Health Records: A Systematic Literature Review. Educational Perspectives in Health Informatics and Information Management, Spring, 1–12. Retrieved from https://perspectives.ahima.org/the-gamification-of-electronic-health-records-a-systematic-literature-review/
  • Fisher, E., McLeod, A., Simkin, M., & Savage, A. (2016). Ghostwriters in the Cloud. Journal of Accounting Education, 34(1), 59–71. https://doi.org/10.1016/j.jaccedu.2015.11.001

2014

  • Utecht, K. M., Schneider, K., McLeod, A., & Hightower, R. (2014). Leveraging Cloud Technology to Introduce Human Capital Management (HCM) into a Human Resource Management (HRM) Curriculum.

2012

  • McLeod, A., & Pippin, S. (2012). Tax software acceptance: How do professional users differ from novices? International Journal of Business Information Systems, 10(3). https://doi.org/10.1504/IJBIS.2012.047533
  • McLeod, A., & Pippin, S. (2012). Toward Multi-Dimensional Trust: Exploring Antecedents to Trust in a Complex Domain. International Journal of Business Information Systems, 9(2). https://doi.org/10.1504/IJBIS.2012.045171

2011

  • Week, J., Ivanova, P., Week, S., & McLeod, A. (2011). A Firewall Data Log Analysis of Unauthorized and Suspicious Traffic. Journal of Information Systems Security, 7(3), 2–15. Retrieved from http://www.jissec.org/Contents/V7/N3/jissec-v7n3-week-p2-ci/?searchterm=mcleod
  • McLeod, A., Pippin, S., & Wong, J. A. (2011). Revisiting the Likert Scale: Can the Fast Form Approach Improve Survey Research? International Journal of Behavioral Accounting and Finance, 2(3/4). https://doi.org/10.1504/IJBAF.2011.045019
  • McLeod, A., & Wang, H. (2011). Validating Originality, Efficiency and Rule Conformity Sub-Scales in the Adaptor-Innovator in the Workplace Measure. International Journal of Behavioral and Healthcare Research, 2(3). Retrieved from http://www.inderscienceonline.com/doi/abs/10.1504/IJBHR.2011.041049
  • McLeod, A., & Clark, J. G. (2011). Healthcare Information Systems Research: Who is the Real User? In New Technologies for Advancing Healthcare and Clinical Practices (pp. 192–210). IGI Global. Retrieved from http://www.igi-global.com/chapter/healthcare-information-systems-research/55145
  • Hewitt, B., & McLeod, A. (2011). Modeling Security in Acceptance of Electronic Health Record Systems. Journal of Information Privacy and Security, 7(3), 23–45. https://doi.org/10.1080/15536548.2011.10855916

2010

  • Conklin, W. A., & McLeod, A. (2010). Information Security Foundations for the Interoperability of Electronic Health Records. International Journal of Healthcare Technology and Management, 11(1/2), 104–112. https://doi.org/10.1504/IJHTM.2010.033278
  • McLeod, A., & Mills, J. (2010). Liquid Embezzlement: Earthquake Reveals Bogus Water Rights Rip Off. Fraud, July/August. Retrieved from http://www.fraud-magazine.com/article.aspx?id=4294967878
  • Barra, R. A., McLeod, A., Savage, A., & Simkin, M. G. (2010). Passwords: Do User Preferences and Website Protocols Differ from Theory? Journal of Information Privacy and Security, 6(4), 50–69. https://doi.org/10.1080/15536548.2010.10855899
  • McLeod, A., Pippin, S., & Simkin, M. G. (2010). Twenty Technology Myths for CPAs. Today’s CPA, May/June. Retrieved from https://www.tscpa.org/membership/news-and-information/todays-cpa
  • Pippin, S., McLeod, A., & Cantania, V. (2010). What’s Important to Tax Software Users? CPA Journal, February(80). Retrieved from https://www.questia.com/magazine/1P3-1967146251/what-is-important-to-tax-software-users
  • Simkin, M. G., & McLeod, A. (2010). Why Do College Students Cheat? Journal of Business Ethics, 94(3), 441–453. https://doi.org/10.1007/s10551-009-0275-x
  • Croasdell, D., McLeod, A., & Simkin, M. G. (2010). Why Don’t More Women Major in IS? Information Technology & People, 24(2), 158–183. https://doi.org/10.1108/09593841111137340
  • Barra, R. A., Savage, A., Simkin, M. G., & McLeod, A. (2010). An Empirical Investigation of Password Protocols.
  • Robert Jr., L. P., Ashley, D. R., & McLeod, A. (2010). Team Situation Awareness and ERP Configuration Performance.
  • Week, J., Ivanova, P., Week, S., & McLeod, A. (2010). What Can Firewall Data Logs Reveal About Intruders at a Small Business Internet Service Provider.
  • McLeod, A., & Clark, J. G. (2010). Using Stakeholder Analysis to Identify Users in Healthcare Information Systems Research: Who is the Real User? In Health Information Systems: Concepts, Methodologies, Tools, and Applications (pp. 1553–1568). IGI Global. https://doi.org/10.4018/978-1-60566-988-5.ch100
  • Kuechler, W., McLeod, A., & Simkin, M. G. (2010). Why Dont More Students Major in IS?
  • McLeod, A., Mark, S., Bret, S., & John, W. (2010). Toward a User Commitment Continuum.

2009

  • Wong, J., Chiang, R. H., & McLeod, A. (2009). A Strategic Management Support Architecture: Integration of the Balanced Scorecard and Enterprise Resource Planning. International Journal of Business Information Systems, 4(5), 581–596. https://doi.org/10.1504/IJBIS.2009.025208
  • Kuechler, W., McLeod, A., & Simkin, M. (2009). Filling the Pipeline for IT Professionals: What Can IS Faculty Do? Journal of Information Systems Education, 20(4). Retrieved from http://www.jise.org/
  • McLeod, A., Pippin, S., & Mason, R. (2009). Individual Taxpayer Intention to Use Tax Preparation Software: Examining Expertise, Experience, Trust and Perceived Risk. Journal of Information Science and Technology, 6(1), 25–45. Retrieved from http://pascal.iseg.utl.pt/ojs/index.php/jist/article/view/84
  • Conklin, W. A., & McLeod, A. (2009). Introducing the Information Technology Security Essential Body of Knowledge Framework. Journal of Information Privacy and Security, 5(2), 27–41. https://doi.org/10.1080/15536548.2009.10855862
  • Crews, J. M., McLeod, A., & Simkin, M. G. (2009). The Ethics of Forced Journal Citations. Communications of the Association for Information Systems, 25(12), 97–110. Retrieved from http://aisel.aisnet.org/cais/vol25/iss1/12/
  • McLeod, A., & Clark, J. G. (2009). Using Stakeholder Analysis to Identify Users in Healthcare Information Systems Research. The International Journal of Health Information Systems and Informatics, 4(3), 1–15. https://doi.org/10.4018/jhisi.2009070101
  • Kuechler, W., McLeod, A., & Simkin, M. (2009). Why Don’t More Students Major in IS? Decision Sciences Journal of Innovative Education, 7(2), 1–27. https://doi.org/10.1111/j.1540-4609.2009.00231.x
  • Conklin, Wm. A., & McLeod, A. (2009). Examining the Information Technology Security Essential Body of Knowledge.
  • McLeod, A., & Pippin, S. (2009). Security and Privacy Trust in E-Government: Understanding System and Relationship Trust Antecedents. In HICSS-42. Retrieved from https://www.computer.org/csdl/proceedings/hicss/2009/3450/00/05-02-01.pdf
  • McLeod, A., & Clark, J. G. (2009). Who is the Real User in Healthcare Information Systems Research? International Journal of Health Information Systems and Informatics, 4(3), 1–15. Retrieved from http://www.igi-global.com/chapter/using-stakeholder-analysis-identify-users/49950
  • McLeod, A., & Pippin, S. (2009). Using Technology Acceptance Theory to Model Individual Differences in Tax Software Use.

2008

  • McLeod, A., Carpenter, D., & Clark, J. G. (2008). Measuring Success in Interorganizational Information Systems: A Case Study. Communications of the Association for Information Systems, 22(34), 1–20. Retrieved from http://aisel.aisnet.org/cais/vol22/iss1/34?utm_source=aisel.aisnet.org%2Fcais%2Fvol22%2Fiss1%2F34&utm_medium=PDF&utm_campaign=PDFCoverPages
  • McLeod, A., Clark, J. G., Warren, J., & Dietrich, G. (2008). The Impact of Information Systems on End User Performance: Examining the Effects of Cognitive Style Using Learning Curves in an Electronic Medical Record Implementation. Communications of the Association of Information Systems, February (22)(9), 165–184. Retrieved from http://aisel.aisnet.org/cais/vol22/iss1/9/
  • McLeod, A., Epley, E., & Silenas, R. (2008). Personal Identity Verification for Regional Emergency Workers. International Journal of Electronic Healthcare, 4(2), 153–165. https://doi.org/10.1504/IJEH.2008.019790
  • Carpenter, D., McLeod, A., & Clark, J. G. (2008). Emergency Response Systems and Biometrics: Assessing Fire Fighter Privacy Concerns.
  • McLeod, A., Pippin, S., & Mason, R. (2008). Individual Taxpayer Intention to Use Tax Preparation Software: Examining Expertise, Experience, Trust and Perceived Risk.
  • McLeod, A., Dorantes, A. C., & Dietrich, G. B. (2008). Modeling Security Vulnerabilities Using Chaos Theory: Discovering Order, Structure, and Patterns from Chaotic Behavior in Complex Systems. Retrieved from https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2515047
  • McLeod, A., Pippin, S., & Mason, R. (2008). Possible Determinants of Individual Taxpayers: Intention to Use Tax Preparation Software: Some Empirical Evidence from a Pilot Study.
  • McLeod, A., Carpenter, D., & Clark, J. G. (2008). Using Biometric Authentication to Improve Fire Ground Accountability: An Assessment of Firefighter Privacy Concerns.

2007

  • Salinas, R., Epley, E., & McLeod, A. (2007). A Uniform Identification Badge for Medical and Emergency Workers: Managing a Regional Personal Identification Verification Program.
  • McLeod, A., & Clark, J. G. (2007). Defining the User in Healthcare Information Systems Research. In HICSS-40. IEEE Computer Society. Retrieved from https://www.computer.org/csdl/proceedings/hicss/2007/2755/00/27550141a-abs.html
  • Carpenter, D., McLeod, A., & Clark, J. G. (2007). The Integration of Biometric Technologies with Fire Fighting Information Systems.

2006

  • Dorantes, C., McLeod, A., & Dietrich, G. B. (2006). Cyber Emergencies: What Managers Can Learn from Complex Systems and Chaos Theory. Retrieved from http://aisel.aisnet.org/amcis2006/201

2004

  • McLeod, A., & Rao, V. S. (2004). The Role of Mentoring in Information System Professional Development. Retrieved from http://aisel.aisnet.org/cgi/viewcontent.cgi?article=2027&context=amcis2004