Merrill Warkentin

Orcid: 0000-0001-7435-7676

According to our database1, Merrill Warkentin authored at least 135 papers between 1989 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
VISTA: An inclusive insider threat taxonomy, with mitigation strategies.
Inf. Manag., January, 2024

Do human capital and relational capital influence knowledge-intensive firm competitiveness? The roles of export orientation and marketing knowledge capability.
J. Knowl. Manag., 2024

Fostering information security compliance as organizational citizenship behavior.
Inf. Manag., 2024

Bridging information systems and marketing: Charting collaborative pathways.
Decis. Support Syst., 2024

Adaptive and maladaptive factors behind password manager use: A hope-extended protection motivation perspective.
Comput. Secur., 2024

Introduction to the Minitrack on The Dark and Bright Sides of the Metaverse.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

Introduction to the Minitrack on Innovative Behavioral IS Security and Privacy Research.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024

Humanizing AI Customer Service: Want to Switch to Human Agents?
Proceedings of the 30th Americas Conference on Information Systems: Elevating Life through Digital Social Entrepreneurship, 2024

The Role of Blockchain Technology Adoption on Data Breaches.
Proceedings of the 30th Americas Conference on Information Systems: Elevating Life through Digital Social Entrepreneurship, 2024

Formation of Cybersecurity Awareness: A Positive Psychological Perspective.
Proceedings of the 30th Americas Conference on Information Systems: Elevating Life through Digital Social Entrepreneurship, 2024

2023
Introduction to the special issue on insider threats in cybersecurity.
J. Inf. Secur. Appl., December, 2023

Unraveling the behavioral influence of social media on phishing susceptibility: A Personality-Habit-Information Processing model.
Inf. Manag., November, 2023

The effects of knowledge mechanisms on employees' information security threat construal.
Inf. Syst. J., July, 2023

Self-efficacy in Information Security: A Replication Study.
J. Comput. Inf. Syst., January, 2023

Seeking rhetorical validity in fear appeal research: An application of rhetorical theory.
Comput. Secur., 2023

2022
Understanding Rumor Combating Behavior on Social Media.
J. Comput. Inf. Syst., November, 2022

SLSS Gamification as an E-Commerce Model in China.
J. Comput. Inf. Syst., September, 2022

Reactions to Abusive Supervision: Neutralization and IS Misuse.
J. Comput. Inf. Syst., 2022

Apps within apps: predicting government WeChat mini-program adoption from trust-risk perspective and innovation diffusion theory.
Inf. Technol. People, 2022

A contextualized comprehensive action determination model for predicting consumer electronics recommerce platform usage: A sequential mixed-methods approach.
Inf. Manag., 2022

Seeking Information Using Search Engines: The Impact of Negation on Judgments.
Commun. Assoc. Inf. Syst., 2022

Understanding the Effects of RationalityBased Theories on Employees' Deviant Use of IS Resources: A Cross Cultural Examination.
Proceedings of the 26th Pacific Asia Conference on Information Systems, 2022

Beyond Rational Information Security Decisions: An Alternate View.
Proceedings of the 28th Americas Conference on Information Systems, 2022

2021

High-Risk Deviant Decisions: Does Neutralization Still Play a Role?
J. Assoc. Inf. Syst., 2021

Herd behavior in information security decision-making.
Inf. Manag., 2021

Can financial incentives help with the struggle for security policy compliance?
Inf. Manag., 2021

Does government social media promote users' information security behavior towards COVID-19 scams? Cultivation effects and protective motivations.
Gov. Inf. Q., 2021

Do You Still Trust?: The Role of Age, Gender, and Privacy Concern on Trust after Insider Data Breaches.
Data Base, 2021

Understanding Unstable Information Systems Phenomena: A Punctuated Equilibrium Perspective.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021

Too Bored to Engage: An Exploratory Study of Information Security-related Boredom.
Proceedings of the 27th Americas Conference on Information Systems, 2021

2020
Grassroots Adoption of Cloud-Based Storage Solutions.
J. Inf. Syst., 2020

Experience Matters: The Role of Vicarious Experience in Secure Actions.
J. Database Manag., 2020

Can Secure Behaviors Be Contagious? A Two-Stage Investigation of the Influence of Herd Behavior on Security Decisions.
J. Assoc. Inf. Syst., 2020

Using the security triad to assess blockchain technology in public sector applications.
Int. J. Inf. Manag., 2020

An imposed etic approach with Schwartz polar dimensions to explore cross-cultural use of social network services.
Inf. Manag., 2020

Integrating elaboration likelihood model and herd theory in information security message persuasiveness.
Comput. Secur., 2020

Introduction to the Minitrack on Innovative Behavioral IS Security and Privacy Research.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

Understanding the Role of Incentives in Security Behavior.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020

How do Leader Emotional Displays Influence Employees' Information Security Effort?
Proceedings of the 26th Americas Conference on Information Systems, 2020

Evaluating the Usability of a Multilingual Passphrase Policy.
Proceedings of the 26th Americas Conference on Information Systems, 2020

2019
Managers' and Employees' Differing Responses to Security Approaches.
J. Comput. Inf. Syst., 2019

Integrating Cognition with an Affective Lens to Better Understand Information Security Policy Compliance.
J. Assoc. Inf. Syst., 2019

Perceived argument quality's effect on threat and coping appraisals in fear appeals: An experiment and exploration of realism check heuristics.
Inf. Manag., 2019

The effects of social media use on control of corruption and moderating role of cultural tightness-looseness.
Gov. Inf. Q., 2019

Speak their Language: Designing Effective Messages to Improve Employees' Information Security Decision Making.
Decis. Sci., 2019

Do I really belong?: Impact of employment status on information security policy compliance.
Comput. Secur., 2019

"This is the way 'I' create my passwords" ... does the endowment effect deter people from changing the way they create their passwords?
Comput. Secur., 2019

Integrating Construal-level Theory in Designing Fear Appeals in IS Security Research.
Commun. Assoc. Inf. Syst., 2019

2018
Don't Even Think About It! The Effects of Antineutralization, Informational, and Normative Communication on Information Security Compliance.
J. Assoc. Inf. Syst., 2018

Examining employee computer abuse intentions: insights from justice, deterrence and neutralization perspectives.
Inf. Syst. J., 2018

Social identity and trust in internet-based voting adoption.
Gov. Inf. Q., 2018

Secure Behavior over Time: Perspectives from the Theory of Process Memory.
Data Base, 2018

Is the responsibilization of the cyber security risk reasonable and judicious?
Comput. Secur., 2018

The impact of collectivism and psychological ownership on protection motivation: A cross-cultural examination.
Comput. Secur., 2018

Ranking Factors by Importance in Factorial Survey Analysis.
Commun. Assoc. Inf. Syst., 2018

Providing Theoretical Foundations: Developing an Integrated Set of Guidelines for Theory Adaptation.
Commun. Assoc. Inf. Syst., 2018

Sustained Secure Behavior and the Role of Self-Efficacy.
Proceedings of the International Conference on Information Systems, 2018

How Do You Handle It? An Investigation of Facebook Affordances and Envy.
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018

Are we Predisposed to Behave Securely? Influence of Risk Disposition on Individual Security Behaviours.
Proceedings of the 26th European Conference on Information Systems: Beyond Digitization, 2018

Why Lie?: Deception of Health Information.
Proceedings of the 24th Americas Conference on Information Systems, 2018

2017
The Effect of Belongingness on Obsessive-Compulsive Disorder in the Use of Online Social Networks.
J. Manag. Inf. Syst., 2017

Implications of Monitoring Mechanisms on Bring Your Own Device Adoption.
J. Comput. Inf. Syst., 2017

Shared Benefits and Information Privacy: What Determines Smart Meter Technology Adoption?
J. Assoc. Inf. Syst., 2017

Leader's dilemma game: An experimental design for cyber insider threat research.
Inf. Syst. Frontiers, 2017

Gender deception in asynchronous online communication: A path analysis.
Inf. Process. Manag., 2017

How do you feel about your friends? Understanding situational envy in online social networks.
Inf. Manag., 2017

Exposing others' information on online social networks (OSNs): Perceived shared risk, its determinants, and its influence on OSN privacy control use.
Inf. Manag., 2017

Exploring the Effects of the Privacy-Handling Management Styles of Social Networking Sites on User Satisfaction: A Conflict Management Perspective.
Decis. Sci., 2017

Risk Homeostasis in Information Security: Challenges in Confirming Existence and Verifying Impact.
Proceedings of the 2017 New Security Paradigms Workshop, 2017

Developing Measurement Scales for Passwords Uniqueness and Secrecy.
Proceedings of the 23rd Americas Conference on Information Systems, 2017

Understanding Nuances of Privacy and Security in the Context of Information Systems.
Proceedings of the 23rd Americas Conference on Information Systems, 2017

2016
Tablet Adoption with Smart School Website Technology.
J. Comput. Inf. Syst., 2016

Neural Correlates of Protection Motivation for Secure IT Behaviors: An fMRI Examination.
J. Assoc. Inf. Syst., 2016

The interpersonal privacy identity (IPI): development of a privacy as control model.
Inf. Technol. Manag., 2016

Dispositional and situational factors: influences on information security policy violations.
Eur. J. Inf. Syst., 2016

Continuance of protective security behavior: A longitudinal study.
Decis. Support Syst., 2016

A Broader View of Perceived Risk during Internet Transactions.
Commun. Assoc. Inf. Syst., 2016

Continuance Intention on Using Mobile Banking Applications: A Replication Study of Information Systems Continuance Model.
AIS Trans. Replication Res., 2016

2015
An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to the Human Asset Through Sanctioning Rhetoric.
MIS Q., 2015

Teaching Social Media in Business.
J. Inf. Technol. Educ. Innov. Pract., 2015

Is this a Joke? The Impact of Message Manipulations on Risk Perceptions.
J. Comput. Inf. Syst., 2015

Examining the moderating role of sense of membership in online review evaluations.
Inf. Manag., 2015

A dual privacy decision model for online social networks.
Inf. Manag., 2015

Cross-cultural IS research: perspectives from Eastern and Western traditions.
Eur. J. Inf. Syst., 2015

Personality, attitudes, and intentions: Predicting initial adoption of information security behavior.
Comput. Secur., 2015

2014
I'm Game, are You? Reducing Real-World Security Threats by Managing Employee Activity in Online Social Networks.
J. Inf. Syst., 2014

Threat Protection and Convenience: Antecedents of Cloud-Based Data Backup.
J. Comput. Inf. Syst., 2014

Introduction to Innovative Behavioral IS Security and Privacy Research Minitrack.
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014

Behavioral Information Security Management.
Proceedings of the Computing Handbook, 2014

2013
Beyond Deterrence: An Expanded View of Employee Computer Abuse.
MIS Q., 2013

Understanding Technology Adoption Trade-Offs: A Conjoint Analysis Approach.
J. Comput. Inf. Syst., 2013

Future directions for behavioral information security research.
Comput. Secur., 2013

Don't make excuses! Discouraging neutralization to reduce IT policy violation.
Comput. Secur., 2013

Implications of Monitoring Mechanisms on Bring Your Own Device (BYOD) Adoption.
Proceedings of the International Conference on Information Systems, 2013

2012
Evolutionary Malware: Mobile Malware, Botnets, and Malware Toolkits.
Int. J. Wirel. Networks Broadband Technol., 2012

The role of intelligent agents and data mining in electronic partnership management.
Expert Syst. Appl., 2012

The Domain Name System - Past, Present, and Future.
Commun. Assoc. Inf. Syst., 2012

Digital Steganography - An Introduction to Techniques and Tools.
Commun. Assoc. Inf. Syst., 2012

Government of the People, By the People: A Look at Trust in eGovernment.
Proceedings of the 18th Americas Conference on Information Systems, 2012

The Role of Individual Characteristics on Insider Abuse Intentions.
Proceedings of the 18th Americas Conference on Information Systems, 2012

Overcoming Mixed-Gender Requirements Misspecification with the Modified Coherence Method.
Proceedings of the 18th Americas Conference on Information Systems, 2012

2011
The influence of the informal social learning environment on information privacy policy compliance efficacy and intention.
Eur. J. Inf. Syst., 2011

Exploring the impact of instant messaging on subjective task complexity and user satisfaction.
Eur. J. Inf. Syst., 2011

The Role of Perceptions of Organizational Injustice and Techniques of Neutralization in Forming Computer Abuse Intentions.
Proceedings of the A Renaissance of Information Technology for Sustainability and Global Competitiveness. 17th Americas Conference on Information Systems, 2011

2010
Fear Appeals and Information Security Behaviors: An Empirical Study.
MIS Q., 2010

The Influence of Perceived Source Credibility on End User Attitudes and Intentions to Comply with Recommended IT Actions.
J. Organ. End User Comput., 2010

Impact of Negative Message Framing on Security Adoption.
J. Comput. Inf. Syst., 2010

2009
An Empirical Assessment of Technology Adoption as a Choice between Alternatives.
Inf. Resour. Manag. J., 2009

Behavioral and policy issues in information systems security: the insider threat.
Eur. J. Inf. Syst., 2009

Analysis of systems development project risks: an integrative framework.
Data Base, 2009

The Impact of National Culture on Workplace Privacy Expectations in the Context of Information Security Assurance.
Proceedings of the 15th Americas Conference on Information Systems, 2009

2008
Steganography: Forensic, Security, and Legal Issues.
J. Digit. Forensics Secur. Law, 2008

Information privacy compliance in the healthcare industry.
Inf. Manag. Comput. Secur., 2008

2007
A Longitudinal Study of Information Exchange in Computer-Mediated and Face-to-Face Groups.
Proceedings of the Decision Support for Global Enterprises, 2007

The IT Security Adoption Conundrum: An Initial Step Toward Validation of Applicable Measures.
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007

An Assessment of U.S. and Chinese Online Gaming Environments and Futures.
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007

Risk Perspectives in Systems Development.
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007

2006
User Interaction with Healthcare Information Systems: Do Healthcare Professionals Want to Comply with HIPAA?
Proceedings of the Connecting the Americas. 12th Americas Conference on Information Systems, 2006

Personality and IT security: An application of the five-factor model.
Proceedings of the Connecting the Americas. 12th Americas Conference on Information Systems, 2006

2005
Cultural Diversity and Trust in IT Adoption: A Comparison of Potential e-Voters in the USA and South Africa.
J. Glob. Inf. Manag., 2005

A framework for spyware assessment.
Commun. ACM, 2005

The Role of Technology Anxiety and Self-Efficacy in Information Technology Training.
Proceedings of the A Conference on a Human Scale. 11th Americas Conference on Information Systems, 2005

2004
Introducing the Check-Off Password System (COPS): An Advancement in User Authentication Methods and Information Security.
J. Organ. End User Comput., 2004

The Role of Technological and Social Factors on the Adoption of Mobile Payment Technologies.
Proceedings of the 10th Americas Conference on Information Systems, 2004

2003
Patient Health Information Search: An Exploratory Model of Web-based Search Behavior.
J. Organ. End User Comput., 2003

2002
Information Everywhere.
Inf. Syst. Manag., 2002

Encouraging Citizen Adoption of eGovernment by Building Trust.
Electron. Mark., 2002

Past, present, and future of decision support technology.
Decis. Support Syst., 2002

Issues in Mobile E-Commerce.
Commun. Assoc. Inf. Syst., 2002

2000
Issues in wireless E-commerce.
SIGecom Exch., 2000

The Role of Mass Customization in Enhancing Supply Chain Relationships in B2C E-Commerce Markets.
J. Electron. Commer. Res., 2000

1999
Training to improve virtual team communication.
Inf. Syst. J., 1999

1992
Threats to Information Systems: Today's Reality, Yesterday's Understanding.
MIS Q., 1992

1989
Expert systems in laboratory medicine and pathology.
Artif. Intell. Medicine, 1989


  Loading...