IS

Wright, Ryan T.

Topic Weight Topic Terms
0.638 structural pls measurement modeling equation research formative squares partial using indicators constructs construct statistical models
0.581 results study research experiment experiments influence implications conducted laboratory field different indicate impact effectiveness future
0.366 expectations expectation music disconfirmation sales analysis vector experiences modeling response polynomial surface discuss panel new
0.208 information security interview threats attacks theory fear vulnerability visibility president vulnerabilities pmt behaviors enforcement appeals
0.202 communication media computer-mediated e-mail richness electronic cmc mail medium message performance convergence used communications messages
0.200 theory theories theoretical paper new understanding work practical explain empirical contribution phenomenon literature second implications
0.148 trust trusting study online perceived beliefs e-commerce intention trustworthiness relationships benevolence initial importance trust-building examines
0.146 approach analysis application approaches new used paper methodology simulation traditional techniques systems process based using
0.119 factors success information critical management implementation study factor successful systems support quality variables related results
0.109 analysis techniques structured categories protocol used evolution support methods protocols verbal improve object-oriented difficulties analyses

Focal Researcher     Coauthors of Focal Researcher (1st degree)     Coauthors of Coauthors (2nd degree)

Note: click on a node to go to a researcher's profile page. Drag a node to reallocate. Number on the edge is the number of co-authorships.

Thatcher, Jason Bennett 3 Chin, Wynne W. 1 Jensen, Matthew L. 1 Lankton, Nancy K. 1
Marett, Kent 1 McKnight, D. Harrison 1
phishing 2 Common method bias 1 computer-mediated deception 1 deception 1
electronic mail fraud 1 expectation disconfirmation theory 1 field experiments 1 Internet security 1
interpersonal deception theory 1 influence techniques 1 IT continuance 1 motivation theory 1
mediated deception 1 online deception 1 partial least squares 1 persuasion theory 1
perceived locus of causality 1 structural equation modeling 1 self-determination 1 social engineering 1
trust 1 technology trust 1 unmeasured latent method construct 1

Articles (4)

Research Note‹Using Expectation Disconfirmation Theory and Polynomial Modeling to Understand Trust in Technology (Information Systems Research, 2016)
Authors: Abstract:
    Trust in technology is an emerging research domain that examines trust in the technology artifact instead of trust in people. Although previous research finds that trust in technology can predict important outcomes, little research has examined the effect of unmet trust in technology expectations on trusting intentions. Furthermore, both trust and expectation disconfirmation theories suggest that trust disconfirmation effects may be more complex than the linear expectation disconfirmation model depicts. However, this complexity may only exist under certain contextual conditions. The current study contributes to this literature by introducing a nonlinear expectation disconfirmation theory model that extends understanding of trust-in-technology expectations and disconfirmation. Not only does the model include both technology trust expectations and technology trusting intention, it also introduces the concept of expectation maturity as a contextual factor. We collected data from three technology usage contexts that differ in expectation maturity, which we operationalize as length of the introductory period. We find that the situation, in terms of expectation maturity, consistently matters. Using polynomial regression and response surface analyses, we find that in contexts with a longer introductory period (i.e., higher expectation maturity), disconfirmation has a nonlinear relationship with trusting intention. When the introductory period is shorter (i.e., expectation maturity is lower), disconfirmation has a linear relationship with trusting intention. This unique set of empirical findings shows when it is valuable to use nonlinear modeling for understanding technology trust disconfirmation. We conclude with implications for future research.
Research Note--Influence Techniques in Phishing Attacks: An Examination of Vulnerability and Resistance (Information Systems Research, 2014)
Authors: Abstract:
    Phishing is a major threat to individuals and organizations. Along with billions of dollars lost annually, phishing attacks have led to significant data breaches, loss of corporate secrets, and espionage. Despite the significant threat, potential phishing targets have little theoretical or practical guidance on which phishing tactics are most dangerous and require heightened caution. The current study extends persuasion and motivation theory to postulate why certain influence techniques are especially dangerous when used in phishing attacks. We evaluated our hypotheses using a large field experiment that involved sending phishing messages to more than 2,600 participants. Results indicated a disparity in levels of danger presented by different influence techniques used in phishing attacks. Specifically, participants were less vulnerable to phishing influence techniques that relied on fictitious prior shared experience and were more vulnerable to techniques offering a high level of self-determination. By extending persuasion and motivation theory to explain the relative efficacy of phishers' influence techniques, this work clarifies significant vulnerabilities and lays the foundation for individuals and organizations to combat phishing through awareness and training efforts.
ASSESSING COMMON METHOD BIAS: PROBLEMS WITH THE ULMC TECHNIQUE. (MIS Quarterly, 2012)
Authors: Abstract:
    Recent work, in journals such as MIS Quarterly and Management Science, has highlighted the importance of evaluating the influence of common method bias (CMB) on the results of statistical analysis. In this research note, we assess the utility of the unmeasured latent method construct (ULMC) approach in partial least squares (PLS), introduced by Liang et al. (2007). Such an assessment of the ULMC approach is important, because it has been employed in 76 studies since it appeared in MIS Quarterly in early 2007. Using data generated via Monte Carlo simulations, we use PLS structural equation modeling (SEM) to demonstrate that the ULMC approach of Liang et al. is neither able to detect, nor control for, common method bias. Method estimates using this approach resulted in negligible estimates, regardless of whether there were some, large, or no method bias introduced in the simulated data. Our study contributes to the IS and research methods literature by illustrating that, and explaining why the ULMC approach does not accurately detect common method bias in PLS. Further, our results build on prior work done using covariance-based SEM questioning the usefulness of the ULMC technique for detecting CMB.
The Influence of Experiential and Dispositional Factors in Phishing: An Empirical Investigation of the Deceived. (Journal of Management Information Systems, 2010)
Authors: Abstract:
    The article presents the results of a field study which investigated the type of internet fraud known as phishing, focusing on factors which cause people to be more or less susceptible to being deceived in this way. The study participants received a phishing e-mail (electronic mail) message asking for information which they were not supposed to divulge. Four behavioral factors were identified as correlating with a tendency to be duped by the phishing message. Suggestions are provided for antiphishing measures based on this data, centering on computer user education.