Search Results - "Wright, Ryan T"
-
1
Mindfulness in Information Technology Use: Definitions, Distinctions, and a New Measure
Published in MIS quarterly (01-09-2018)“…Mindfulness is an important emerging topic. Individual mindfulness in IT use has not been studied systematically. Through three programmatic empirical studies,…”
Get full text
Journal Article -
2
Assessing Common Method Bias: Problems with the ULMC Technique
Published in MIS quarterly (01-09-2012)“…Recent work, in journals such as MIS Quarterly and Management Science, has highlighted the importance of evaluating the influence of common method bias (CMB)…”
Get full text
Journal Article -
3
Improving Phishing Reporting Using Security Gamification
Published in Journal of management information systems (03-07-2022)“…Phishing is an increasing threat that causes billions in losses and damage to productivity, trade secrets, and reputations each year. This work explores how…”
Get full text
Journal Article -
4
The Influence of Experiential and Dispositional Factors in Phishing: An Empirical Investigation of the Deceived
Published in Journal of management information systems (01-07-2010)“…Phishing has been a major problem for information systems managers and users for several years now. In 2008, it was estimated that phishing resulted in close…”
Get full text
Journal Article -
5
A comparison of features in a crowdsourced phishing warning system
Published in Information systems journal (Oxford, England) (01-05-2021)“…Initial research on using crowdsourcing as a collaborative method for helping individuals identify phishing messages has shown promising results. However, the…”
Get full text
Journal Article -
6
Influence techniques in phishing attacks: an examination of vulnerability and resistance
Published in Information systems research (01-06-2014)“…Phishing is a major threat to individuals and organizations. Along with billions of dollars lost annually, phishing attacks have led to significant data…”
Get full text
Journal Article -
7
Using expectation disconfirmation theory and polynomial modeling to understand trust in technology
Published in Information systems research (01-03-2016)Get full text
Journal Article -
8
Operationalizing Multidimensional Constructs in Structural Equation Modeling: Recommendations for IS Research
Published in Communications of the Association for Information Systems (2012)“…Although scholars have provided advice regarding how to conceptualize multidimensional constructs, less attention has been directed on how to evaluate…”
Get full text
Journal Article -
9
An Empirical Investigation of The Unintended Consequences of Vulnerability Assessments Leading to Betrayal
Published in Journal of the Association for Information Systems (01-01-2024)“…When cybersecurity units conduct vulnerability assessments to evaluate the security of organizations, they can have unintended consequences for employees…”
Get full text
Journal Article -
10
IS 2010: Curriculum Guidelines for Undergraduate Degree Programs in Information Systems
Published in Communications of the Association for Information Systems (2010)“…IS 2010 is the latest in a series of model curricula for undergraduate degrees in Information Systems. It builds on the foundation formed by this earlier work,…”
Get full text
Journal Article -
11
The Scholarly Divide: Insights from the AIS Well-being Project
Published in Communications of the Association for Information Systems (2023)“…This article provides an overview of the findings from the Information Systems (IS) Well-Being Project that was started in the fall of 2020. There were two…”
Get full text
Journal Article -
12
Moving Toward the Next Generation of Graduate Degree Programs in Information Systems
Published in Communications of the Association for Information Systems (2014)“…The curriculum recommendations for master’s level degree programs in Information Systems (most recently, MSIS 2006) have served the IS community well and…”
Get full text
Journal Article -
13
Training to Mitigate Phishing Attacks Using Mindfulness Techniques
Published in Journal of management information systems (03-04-2017)“…Phishing attacks are at a record high and are causing billions of dollars in losses. To mitigate phishing's impact, organizations often use rule-based training…”
Get full text
Journal Article -
14
Revising Undergraduate IS Model Curriculum: New Outcome Expectations
Published in Communications of the Association for Information Systems (2008)“…This paper outlines and further specifies the key points articulated in an IS Model Curriculum panel presentation at the Americas Conference for Information…”
Get full text
Journal Article -
15
Revising the IS Model Curriculum: Rethinking the Approach and the Process
Published in Communications of the Association for Information Systems (2007)“…This paper summarizes the key elements of a panel presentation at the Americas Conference for Information Systems (AMCIS) 2007 that reviewed the current status…”
Get full text
Journal Article -
16
Revisiting the Impact of System Use on Task Performance: An Exploitative-Explorative System Use Framework
Published in Journal of the Association for Information Systems (2019)“…How information systems impact task performance has attracted a significant amount of attention from information systems researchers and generated high…”
Get full text
Journal Article -
17
Research note: using expectation disconfirmation theory and polynomial modeling to understand trust in technology
Published in Information systems research (01-03-2016)Get full text
Journal Article -
18
Research Note—Using Expectation Disconfirmation Theory and Polynomial Modeling to Understand Trust in Technology
Published in Information systems research (01-03-2016)“…Trust in technology is an emerging research domain that examines trust in the technology artifact instead of trust in people. Although previous research finds…”
Get full text
Journal Article -
19
Research Note-Influence Techniques in Phishing Attacks: An Examination of Vulnerability and Resistance
Published in Information systems research (01-06-2014)“…Phishing is a major threat to individuals and organizations. Along with billions of dollars lost annually, phishing attacks have led to significant data…”
Get full text
Journal Article -
20
Introduction to Human-Computer Interaction (HCI) Minitrack: Informing Design Choices Utilizing Behavioral, Neurophysiological, and Design Science Methods
Published in 2013 46th Hawaii International Conference on System Sciences (01-01-2013)“…Introduction to Human Computer Interaction…”
Get full text
Conference Proceeding