Search Results - "Wright, Ryan T"

Refine Results
  1. 1

    Mindfulness in Information Technology Use: Definitions, Distinctions, and a New Measure by Thatcher, Jason Bennett, Wright, Ryan T., Sun, Heshan, Zagenczyk, Thomas J., Klein, Richard

    Published in MIS quarterly (01-09-2018)
    “…Mindfulness is an important emerging topic. Individual mindfulness in IT use has not been studied systematically. Through three programmatic empirical studies,…”
    Get full text
    Journal Article
  2. 2

    Assessing Common Method Bias: Problems with the ULMC Technique by Chin, Wynne W., Thatcher, Jason Bennett, Wright, Ryan T.

    Published in MIS quarterly (01-09-2012)
    “…Recent work, in journals such as MIS Quarterly and Management Science, has highlighted the importance of evaluating the influence of common method bias (CMB)…”
    Get full text
    Journal Article
  3. 3

    Improving Phishing Reporting Using Security Gamification by Jensen, Matthew L., Wright, Ryan T., Durcikova, Alexandra, Karumbaiah, Shamya

    Published in Journal of management information systems (03-07-2022)
    “…Phishing is an increasing threat that causes billions in losses and damage to productivity, trade secrets, and reputations each year. This work explores how…”
    Get full text
    Journal Article
  4. 4

    The Influence of Experiential and Dispositional Factors in Phishing: An Empirical Investigation of the Deceived by Wright, Ryan T., Marett, Kent

    Published in Journal of management information systems (01-07-2010)
    “…Phishing has been a major problem for information systems managers and users for several years now. In 2008, it was estimated that phishing resulted in close…”
    Get full text
    Journal Article
  5. 5

    A comparison of features in a crowdsourced phishing warning system by Nguyen, Christopher, Jensen, Matthew L., Durcikova, Alexandra, Wright, Ryan T.

    “…Initial research on using crowdsourcing as a collaborative method for helping individuals identify phishing messages has shown promising results. However, the…”
    Get full text
    Journal Article
  6. 6

    Influence techniques in phishing attacks: an examination of vulnerability and resistance by Wright, Ryan T, Ensen, Matthew L, Thatcher, Jason Bennett, Dinger, Michael, Marett, Kent

    Published in Information systems research (01-06-2014)
    “…Phishing is a major threat to individuals and organizations. Along with billions of dollars lost annually, phishing attacks have led to significant data…”
    Get full text
    Journal Article
  7. 7
  8. 8

    Operationalizing Multidimensional Constructs in Structural Equation Modeling: Recommendations for IS Research by Wright, Ryan T., Campbell, Damon E., Thatcher, Jason Bennett, Roberts, Nicholas

    “…Although scholars have provided advice regarding how to conceptualize multidimensional constructs, less attention has been directed on how to evaluate…”
    Get full text
    Journal Article
  9. 9

    An Empirical Investigation of The Unintended Consequences of Vulnerability Assessments Leading to Betrayal by Pienta, Daniel, Thatcher, Jason Bennett, Wright, Ryan T., Roth, Philip L.

    “…When cybersecurity units conduct vulnerability assessments to evaluate the security of organizations, they can have unintended consequences for employees…”
    Get full text
    Journal Article
  10. 10

    IS 2010: Curriculum Guidelines for Undergraduate Degree Programs in Information Systems by Topi, Heikki, Valacich, Joseph S., Wright, Ryan T., Kaiser, Kate, Nunamaker, Jr, Sipior, Janice C., de Vreede, Gert Jan

    “…IS 2010 is the latest in a series of model curricula for undergraduate degrees in Information Systems. It builds on the foundation formed by this earlier work,…”
    Get full text
    Journal Article
  11. 11

    The Scholarly Divide: Insights from the AIS Well-being Project by Wright, Ryan, Saunders, Carol, Sarker, Saonee, Kankanhalli, Atreyi, Whitley, Edgar, Tuunainen, Virpi, Henriksen, Helle

    “…This article provides an overview of the findings from the Information Systems (IS) Well-Being Project that was started in the fall of 2020. There were two…”
    Get full text
    Journal Article
  12. 12

    Moving Toward the Next Generation of Graduate Degree Programs in Information Systems by Topi, Heikki, Conboy, Kieran, Donnellan, Brian, Ramesh, V., Van Toorn, Christine, Wright, Ryan T.

    “…The curriculum recommendations for master’s level degree programs in Information Systems (most recently, MSIS 2006) have served the IS community well and…”
    Get full text
    Journal Article
  13. 13

    Training to Mitigate Phishing Attacks Using Mindfulness Techniques by Jensen, Matthew L., Dinger, Michael, Wright, Ryan T., Thatcher, Jason Bennett

    Published in Journal of management information systems (03-04-2017)
    “…Phishing attacks are at a record high and are causing billions of dollars in losses. To mitigate phishing's impact, organizations often use rule-based training…”
    Get full text
    Journal Article
  14. 14

    Revising Undergraduate IS Model Curriculum: New Outcome Expectations by Topi, Heikki, Valacich, Joseph S., Wright, Ryan T., Kaiser, Kate, Nunamaker, Jr, Sipior, Janice C., de Vreede, Gert Jan

    “…This paper outlines and further specifies the key points articulated in an IS Model Curriculum panel presentation at the Americas Conference for Information…”
    Get full text
    Journal Article
  15. 15

    Revising the IS Model Curriculum: Rethinking the Approach and the Process by Topi, Heikki, Valacich, Joseph S., Kaiser, Kate, Nunamaker, Jr, Sipior, Janice, de Vreede, Gert Jan, Wright, Ryan T.

    “…This paper summarizes the key elements of a panel presentation at the Americas Conference for Information Systems (AMCIS) 2007 that reviewed the current status…”
    Get full text
    Journal Article
  16. 16

    Revisiting the Impact of System Use on Task Performance: An Exploitative-Explorative System Use Framework by Sun, Heshan, Wright, Ryan T., Thatcher, Jason B.

    “…How information systems impact task performance has attracted a significant amount of attention from information systems researchers and generated high…”
    Get full text
    Journal Article
  17. 17
  18. 18

    Research Note—Using Expectation Disconfirmation Theory and Polynomial Modeling to Understand Trust in Technology by Lankton, Nancy K., McKnight, D. Harrison, Wright, Ryan T., Thatcher, Jason Bennett

    Published in Information systems research (01-03-2016)
    “…Trust in technology is an emerging research domain that examines trust in the technology artifact instead of trust in people. Although previous research finds…”
    Get full text
    Journal Article
  19. 19

    Research Note-Influence Techniques in Phishing Attacks: An Examination of Vulnerability and Resistance by Wright, Ryan T., Jensen, Matthew L., Thatcher, Jason Bennett, Dinger, Michael, Marett, Kent

    Published in Information systems research (01-06-2014)
    “…Phishing is a major threat to individuals and organizations. Along with billions of dollars lost annually, phishing attacks have led to significant data…”
    Get full text
    Journal Article
  20. 20