Dr. Tripti Singh Assistant Professor, Information Systems Contact 301 Sparkman DriveBusiness Administration BuildingRoom 380Huntsville, AL 35899 Campus Map 256.824.6804tripti.singh@uah.edu Biography Curriculum Vitae Education Ph.D. Management Information Systems, The University of Alabama, 2021 Master of Public Health, Healthcare Organization & Policy, University of Alabama at Birmingham, 2016 Master of Business Administration, Information Systems, University of Alabama at Birmingham, 2016 Master of Science, Punjab Agricultural University, 2007 Bachelor of Science ,Gobind Ballabh Pant University of Agriculture and Technology, 2005 Honors & Awards Student Choice Award for Teaching, Honor Roll, Graduate Teaching 2025 Expertise Cybersecurity Healthcare Information Systems Information Privacy Recent Publications Hassandoust F., Singh, T., Johnston A.C. (2026). “Technology-Based Service Adoption Decision: The Role of Value Congruence and Emotional Dynamics” Behaviour & Information Technology. Ranking-ABDC List-A, ahead of print Singh, T., Johnston, A.C., Hudnall, M., Bott, G (2026). “Understanding Surveillance Stress in Cybersecurity Professionals: A Stage Model Perspective. Computers & Security. Ranking-ABDC List A, ahead of print Singh, T., Di Gangi, P., Johnston, A. C., Bott, G., Lowry, P. B. (2026). “An Examination of Risk Perceptions and Protected Health Information Disclosure Intentions: A Situational Privacy Perspective,” Information Systems Frontier. Ranking ABDC List-A Bhatt P., Singh T., Pavlopoulos V., Pham H. (2025). “Decoding Sentiments: Measuring Human Interpretations of AI-Generated Content in Digital Contexts.” Journal of Global Information Management. Ranking ABDC List-A. Pham, H., Tan, Y., Singh, T., Pavlopoulos, V., Patnayakuni, R. (2024). A Multi-head Attention-like Feature Selection Approach for Tabular Data.” Knowledge-Based Systems, 301,112250. Ranking ABDC List-A Singh, T., Johnston, A. C., D'Arcy, J., & Harms, P. D. (2023). Stress in the cybersecurity profession: a systematic review of related literature and opportunities for future research. Organizational Cybersecurity Journal: Practice, Process and People, Vol. ahead-of-print Yang, N., Singh, T., & Johnston, A. (2020). A Replication Study of User Motivation in Protecting Information Security using Protection Motivation Theory and Self Determination Theory. AIS Transactions on Replication Research, 6(1), 10 Johnston, A., Di Gangi, P. M., Bélanger, F., Crossler, R. E., Siponen, M., Warkentin, M., & Singh, T. (2023). Seeking rhetorical validity in fear appeal research: An application of rhetorical theory. Computers & Security, 125, 103020.