Kent Marett

Orcid: 0000-0002-0949-9069

According to our database1, Kent Marett authored at least 41 papers between 2004 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Security compliance and work-issued mobile devices: Out of sight, out of mind?
Inf. Syst. E Bus. Manag., December, 2023

2022
What do Users Actually Look at During 'Zoom' Meetings? Discovery Research on Attention, Gender and Distraction Effects.
Proceedings of the 55th Hawaii International Conference on System Sciences, 2022

2021
Local learning from municipal ransomware attacks: A geographically weighted analysis.
Inf. Manag., 2021

2020
The Impact of Awareness of Being Monitored on Computer Usage Policy Compliance: An Agency View.
J. Inf. Syst., 2020

Local Learning from Municipal Ransomware Attacks.
Proceedings of the 26th Americas Conference on Information Systems, 2020

2019
<i>Invited Paper</i>: The Times they are a Changin': How Non-Technology Factors have Affected IS Curriculum over Time.
J. Inf. Syst. Educ., 2019

Information Security Practices in Small-to-Medium Sized Businesses: A Hotspot Analysis.
Inf. Resour. Manag. J., 2019

A quantitative textual analysis of three types of threat communication and subsequent maladaptive responses.
Comput. Secur., 2019

2018
Blame Distribution Following Information Security Breaches.
Proceedings of the 24th Americas Conference on Information Systems, 2018

Broadband Internet Access as a Localized Facilitator for Improving Security Knowledge.
Proceedings of the 24th Americas Conference on Information Systems, 2018

2017
Beware the dark side: Cultural preferences for lying online.
Comput. Hum. Behav., 2017

2016
The Dark Internet: Without Darkness There is No Light.
Proceedings of the 22nd Americas Conference on Information Systems, 2016

2015
The Role of Relational Familiarity When Interpreting Family Business Communication.
IEEE Trans. Prof. Commun., 2015

Checking the manipulation checks in information security research.
Inf. Comput. Secur., 2015

Stretching from Punch Card/Programming to Business Data Processing to Business Information Systems.
Commun. Assoc. Inf. Syst., 2015

2014
Research Note - Influence Techniques in Phishing Attacks: An Examination of Vulnerability and Resistance.
Inf. Syst. Res., 2014

Extending Ecommerce Deception Theory to Phishing.
Proceedings of the International Conference on Information Systems, 2014

2013
Assessing the Effects of Benefits and Institutional Influences on the Continued Use of Environmentally Munificent Bypass Systems in Long-Haul Trucking.
MIS Q., 2013

An investigation of the impact of abusive supervision on technology end-users.
Comput. Hum. Behav., 2013

2012
An Examination of Deception in Virtual Teams: Effects of Deception on Task Performance, Mutuality, and Trust.
IEEE Trans. Prof. Commun., 2012

Post-Acceptance Intentions and Behaviors: An Empirical Investigation of Information Technology Use and Innovation.
J. Organ. End User Comput., 2012

The Impact of Ability and Participation on Trustworthiness and Task Performance in Virtual Teams.
Int. J. Soc. Organ. Dyn. IT, 2012

Pay What You Want: An Exploratory Study of Social Exchange and Buyer-Determined Prices of iProducts.
Commun. Assoc. Inf. Syst., 2012

2010
The Influence of Experiential and Dispositional Factors in Phishing: An Empirical Investigation of the Deceived.
J. Manag. Inf. Syst., 2010

2009
An Investigation of Liking of Computers, Help Received, and Job Outcomes for Computer Workers.
J. Organ. End User Comput., 2009

The Decision to Share Information and Rumors: Examining the Role of Motivation in an Online Discussion Forum.
Commun. Assoc. Inf. Syst., 2009

The Effectiveness of Deceptive Tactics in Phishing.
Proceedings of the 15th Americas Conference on Information Systems, 2009

2008
Deceptive Communication in E-Collaboration.
Proceedings of the Handbook of Research on Computer Mediated Communication (2 Volumes), 2008

The Role of E-Training in Protecting Information Assets Against Deception Attacks.
MIS Q. Executive, 2008

Deception: Toward an Individualistic View of Group Support Systems.
J. Assoc. Inf. Syst., 2008

Detecting Deception in Computer-Mediated Interviewing.
Proceedings of the 16th European Conference on Information Systems, 2008

2006
The Role of Decision Support in Alleviating the Familiarity Bias.
Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006

Vigilance and Error Detection in an Automated Command and Control Environment.
Proceedings of the 39th Hawaii International International Conference on Systems Science (HICSS-39 2006), 2006

Internet Abuse: A General Theory of Crime Framework.
Proceedings of the Connecting the Americas. 12th Americas Conference on Information Systems, 2006

2005
Deception: The Dark Side of E-Collaboration.
Int. J. e Collab., 2005

Gender Differences in Deception and Its Detection Under Varying Electronic Media Conditions.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005

Group Deception in Computer-Supported Environments.
Proceedings of the 38th Hawaii International Conference on System Sciences (HICSS-38 2005), 2005

2004
Self-efficacy, Training Effectiveness, and Deception Detection: A Longitudinal Study of Lie Detection Training.
Proceedings of the Intelligence and Security Informatics, 2004

Deception Detection under Varying Electronic Media and Warning Conditions.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

Training to Detect Deception: An Experimental Investigation.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004

Inhibiting Deception and Its Detection.
Proceedings of the 37th Hawaii International Conference on System Sciences (HICSS-37 2004), 2004


  Loading...