Merrill Warkentin
Orcid: 0000-0001-7435-7676
According to our database1,
Merrill Warkentin
authored at least 135 papers
between 1989 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on id.loc.gov
-
on d-nb.info
On csauthors.net:
Bibliography
2024
Inf. Manag., January, 2024
Do human capital and relational capital influence knowledge-intensive firm competitiveness? The roles of export orientation and marketing knowledge capability.
J. Knowl. Manag., 2024
Inf. Manag., 2024
Decis. Support Syst., 2024
Adaptive and maladaptive factors behind password manager use: A hope-extended protection motivation perspective.
Comput. Secur., 2024
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024
Introduction to the Minitrack on Innovative Behavioral IS Security and Privacy Research.
Proceedings of the 57th Hawaii International Conference on System Sciences, 2024
Proceedings of the 30th Americas Conference on Information Systems: Elevating Life through Digital Social Entrepreneurship, 2024
Proceedings of the 30th Americas Conference on Information Systems: Elevating Life through Digital Social Entrepreneurship, 2024
Proceedings of the 30th Americas Conference on Information Systems: Elevating Life through Digital Social Entrepreneurship, 2024
2023
J. Inf. Secur. Appl., December, 2023
Unraveling the behavioral influence of social media on phishing susceptibility: A Personality-Habit-Information Processing model.
Inf. Manag., November, 2023
The effects of knowledge mechanisms on employees' information security threat construal.
Inf. Syst. J., July, 2023
J. Comput. Inf. Syst., January, 2023
Seeking rhetorical validity in fear appeal research: An application of rhetorical theory.
Comput. Secur., 2023
2022
J. Comput. Inf. Syst., November, 2022
J. Comput. Inf. Syst., September, 2022
J. Comput. Inf. Syst., 2022
Apps within apps: predicting government WeChat mini-program adoption from trust-risk perspective and innovation diffusion theory.
Inf. Technol. People, 2022
A contextualized comprehensive action determination model for predicting consumer electronics recommerce platform usage: A sequential mixed-methods approach.
Inf. Manag., 2022
Commun. Assoc. Inf. Syst., 2022
Understanding the Effects of RationalityBased Theories on Employees' Deviant Use of IS Resources: A Cross Cultural Examination.
Proceedings of the 26th Pacific Asia Conference on Information Systems, 2022
Proceedings of the 28th Americas Conference on Information Systems, 2022
2021
Proceedings of the Advancing Research in Information and Communication Technology, 2021
J. Assoc. Inf. Syst., 2021
Inf. Manag., 2021
Does government social media promote users' information security behavior towards COVID-19 scams? Cultivation effects and protective motivations.
Gov. Inf. Q., 2021
Do You Still Trust?: The Role of Age, Gender, and Privacy Concern on Trust after Insider Data Breaches.
Data Base, 2021
Understanding Unstable Information Systems Phenomena: A Punctuated Equilibrium Perspective.
Proceedings of the 54th Hawaii International Conference on System Sciences, 2021
Proceedings of the 27th Americas Conference on Information Systems, 2021
2020
J. Database Manag., 2020
Can Secure Behaviors Be Contagious? A Two-Stage Investigation of the Influence of Herd Behavior on Security Decisions.
J. Assoc. Inf. Syst., 2020
Using the security triad to assess blockchain technology in public sector applications.
Int. J. Inf. Manag., 2020
An imposed etic approach with Schwartz polar dimensions to explore cross-cultural use of social network services.
Inf. Manag., 2020
Integrating elaboration likelihood model and herd theory in information security message persuasiveness.
Comput. Secur., 2020
Introduction to the Minitrack on Innovative Behavioral IS Security and Privacy Research.
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020
Proceedings of the 53rd Hawaii International Conference on System Sciences, 2020
Proceedings of the 26th Americas Conference on Information Systems, 2020
Proceedings of the 26th Americas Conference on Information Systems, 2020
2019
J. Comput. Inf. Syst., 2019
Integrating Cognition with an Affective Lens to Better Understand Information Security Policy Compliance.
J. Assoc. Inf. Syst., 2019
Perceived argument quality's effect on threat and coping appraisals in fear appeals: An experiment and exploration of realism check heuristics.
Inf. Manag., 2019
The effects of social media use on control of corruption and moderating role of cultural tightness-looseness.
Gov. Inf. Q., 2019
Speak their Language: Designing Effective Messages to Improve Employees' Information Security Decision Making.
Decis. Sci., 2019
Do I really belong?: Impact of employment status on information security policy compliance.
Comput. Secur., 2019
"This is the way 'I' create my passwords" ... does the endowment effect deter people from changing the way they create their passwords?
Comput. Secur., 2019
Integrating Construal-level Theory in Designing Fear Appeals in IS Security Research.
Commun. Assoc. Inf. Syst., 2019
2018
Don't Even Think About It! The Effects of Antineutralization, Informational, and Normative Communication on Information Security Compliance.
J. Assoc. Inf. Syst., 2018
Examining employee computer abuse intentions: insights from justice, deterrence and neutralization perspectives.
Inf. Syst. J., 2018
Data Base, 2018
Comput. Secur., 2018
The impact of collectivism and psychological ownership on protection motivation: A cross-cultural examination.
Comput. Secur., 2018
Commun. Assoc. Inf. Syst., 2018
Providing Theoretical Foundations: Developing an Integrated Set of Guidelines for Theory Adaptation.
Commun. Assoc. Inf. Syst., 2018
Proceedings of the International Conference on Information Systems, 2018
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018
Are we Predisposed to Behave Securely? Influence of Risk Disposition on Individual Security Behaviours.
Proceedings of the 26th European Conference on Information Systems: Beyond Digitization, 2018
Proceedings of the 24th Americas Conference on Information Systems, 2018
2017
The Effect of Belongingness on Obsessive-Compulsive Disorder in the Use of Online Social Networks.
J. Manag. Inf. Syst., 2017
J. Comput. Inf. Syst., 2017
Shared Benefits and Information Privacy: What Determines Smart Meter Technology Adoption?
J. Assoc. Inf. Syst., 2017
Inf. Syst. Frontiers, 2017
Inf. Process. Manag., 2017
How do you feel about your friends? Understanding situational envy in online social networks.
Inf. Manag., 2017
Exposing others' information on online social networks (OSNs): Perceived shared risk, its determinants, and its influence on OSN privacy control use.
Inf. Manag., 2017
Exploring the Effects of the Privacy-Handling Management Styles of Social Networking Sites on User Satisfaction: A Conflict Management Perspective.
Decis. Sci., 2017
Risk Homeostasis in Information Security: Challenges in Confirming Existence and Verifying Impact.
Proceedings of the 2017 New Security Paradigms Workshop, 2017
Proceedings of the 23rd Americas Conference on Information Systems, 2017
Proceedings of the 23rd Americas Conference on Information Systems, 2017
2016
Neural Correlates of Protection Motivation for Secure IT Behaviors: An fMRI Examination.
J. Assoc. Inf. Syst., 2016
Inf. Technol. Manag., 2016
Dispositional and situational factors: influences on information security policy violations.
Eur. J. Inf. Syst., 2016
Decis. Support Syst., 2016
Commun. Assoc. Inf. Syst., 2016
Continuance Intention on Using Mobile Banking Applications: A Replication Study of Information Systems Continuance Model.
AIS Trans. Replication Res., 2016
2015
An Enhanced Fear Appeal Rhetorical Framework: Leveraging Threats to the Human Asset Through Sanctioning Rhetoric.
MIS Q., 2015
J. Comput. Inf. Syst., 2015
Inf. Manag., 2015
Eur. J. Inf. Syst., 2015
Personality, attitudes, and intentions: Predicting initial adoption of information security behavior.
Comput. Secur., 2015
2014
I'm Game, are You? Reducing Real-World Security Threats by Managing Employee Activity in Online Social Networks.
J. Inf. Syst., 2014
J. Comput. Inf. Syst., 2014
Proceedings of the 47th Hawaii International Conference on System Sciences, 2014
Behavioral Information Security Management.
Proceedings of the Computing Handbook, 2014
2013
J. Comput. Inf. Syst., 2013
Comput. Secur., 2013
Proceedings of the International Conference on Information Systems, 2013
2012
Int. J. Wirel. Networks Broadband Technol., 2012
Expert Syst. Appl., 2012
Commun. Assoc. Inf. Syst., 2012
Proceedings of the 18th Americas Conference on Information Systems, 2012
Proceedings of the 18th Americas Conference on Information Systems, 2012
Overcoming Mixed-Gender Requirements Misspecification with the Modified Coherence Method.
Proceedings of the 18th Americas Conference on Information Systems, 2012
2011
The influence of the informal social learning environment on information privacy policy compliance efficacy and intention.
Eur. J. Inf. Syst., 2011
Exploring the impact of instant messaging on subjective task complexity and user satisfaction.
Eur. J. Inf. Syst., 2011
The Role of Perceptions of Organizational Injustice and Techniques of Neutralization in Forming Computer Abuse Intentions.
Proceedings of the A Renaissance of Information Technology for Sustainability and Global Competitiveness. 17th Americas Conference on Information Systems, 2011
2010
The Influence of Perceived Source Credibility on End User Attitudes and Intentions to Comply with Recommended IT Actions.
J. Organ. End User Comput., 2010
2009
Inf. Resour. Manag. J., 2009
Eur. J. Inf. Syst., 2009
Data Base, 2009
The Impact of National Culture on Workplace Privacy Expectations in the Context of Information Security Assurance.
Proceedings of the 15th Americas Conference on Information Systems, 2009
2008
J. Digit. Forensics Secur. Law, 2008
Inf. Manag. Comput. Secur., 2008
2007
A Longitudinal Study of Information Exchange in Computer-Mediated and Face-to-Face Groups.
Proceedings of the Decision Support for Global Enterprises, 2007
The IT Security Adoption Conundrum: An Initial Step Toward Validation of Applicable Measures.
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007
Proceedings of the Reaching New Heights. 13th Americas Conference on Information Systems, 2007
2006
User Interaction with Healthcare Information Systems: Do Healthcare Professionals Want to Comply with HIPAA?
Proceedings of the Connecting the Americas. 12th Americas Conference on Information Systems, 2006
Proceedings of the Connecting the Americas. 12th Americas Conference on Information Systems, 2006
2005
Cultural Diversity and Trust in IT Adoption: A Comparison of Potential e-Voters in the USA and South Africa.
J. Glob. Inf. Manag., 2005
Proceedings of the A Conference on a Human Scale. 11th Americas Conference on Information Systems, 2005
2004
Introducing the Check-Off Password System (COPS): An Advancement in User Authentication Methods and Information Security.
J. Organ. End User Comput., 2004
The Role of Technological and Social Factors on the Adoption of Mobile Payment Technologies.
Proceedings of the 10th Americas Conference on Information Systems, 2004
2003
Patient Health Information Search: An Exploratory Model of Web-based Search Behavior.
J. Organ. End User Comput., 2003
2002
2000
The Role of Mass Customization in Enhancing Supply Chain Relationships in B2C E-Commerce Markets.
J. Electron. Commer. Res., 2000
1999
1992
MIS Q., 1992
1989