scispace - formally typeset
G

Gary F. Templeton

Researcher at Mississippi State University

Publications -  39
Citations -  1648

Gary F. Templeton is an academic researcher from Mississippi State University. The author has contributed to research in topics: Organizational learning & Information technology. The author has an hindex of 13, co-authored 38 publications receiving 1448 citations. Previous affiliations of Gary F. Templeton include University of Alabama & Athens State University.

Papers
More filters
Journal ArticleDOI

A Two-Step Approach for Transforming Continuous Variables to Normal: Implications and Recommendations for IS Research

TL;DR: A two-step approach for transforming non-normally distributed continuous variables to become normally distributed by applying the inverse-normal transformation to the results of the first step to form a variable consisting of normally distributed z-scores.
Journal ArticleDOI

A methodology for construct development in MIS research

TL;DR: An assessment of the proposed methodology indicates that its adoption in MIS research would greatly improve the rigor of construct development projects and its performance when compared to a number of prominent standards for assessing construct development research.
Journal ArticleDOI

Development of a Measure for the Organizational Learning Construct

TL;DR: This research represents the initial work in developing an empirically reliable and valid measure of organizational learning and includes an eightfactor, 28-item instrument for assessing OL, derived from a sample of 119 knowledge-based firms.
Journal ArticleDOI

A Scientometric Investigation into the Validity of IS Journal Quality Measures

TL;DR: It is concluded that recent studies in the IS journal quality stream are credible and these journal quality measures provide appropriate indicators of relative journal quality.
Journal ArticleDOI

A framework for spyware assessment

TL;DR: One of the most challenging problems confronting the IT community is responding to the threat of spyware and research, legislative actions, and policy changes have been hastened to counter spyware.