default search action
Kent Marett
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2024
- [j25]Akmal Mirsadikov, Alaa Nehme, Ali Vedadi, Kent Marett:
Virtual Lies and Digital Truths: A Review of Research on Deception in Online Communication. Found. Trends Inf. Syst. 7(3): 253-309 (2024) - [j24]Akmal Mirsadikov, Ali Vedadi, Kent Marett:
Detecting deception in computer-mediated communication: the role of popularity information across media types. Inf. Comput. Secur. 32(3): 378-401 (2024) - 2023
- [j23]Kent Marett, Shan Xiao, Sumin Kim:
Security compliance and work-issued mobile devices: Out of sight, out of mind? Inf. Syst. E Bus. Manag. 21(4): 913-945 (2023) - 2021
- [j22]Kent Marett, Misty Nabors:
Local learning from municipal ransomware attacks: A geographically weighted analysis. Inf. Manag. 58(7): 103482 (2021) - 2020
- [j21]Nirmalee I. Raddatz, Kent Marett, Brad S. Trinkle:
The Impact of Awareness of Being Monitored on Computer Usage Policy Compliance: An Agency View. J. Inf. Syst. 34(1): 135-149 (2020) - 2019
- [j20]Kent Marett, Ali Vedadi, Alexandra Durcikova:
A quantitative textual analysis of three types of threat communication and subsequent maladaptive responses. Comput. Secur. 80: 25-35 (2019) - [j19]Kent Marett, Tim Barnett:
Information Security Practices in Small-to-Medium Sized Businesses: A Hotspot Analysis. Inf. Resour. Manag. J. 32(2): 76-93 (2019) - [j18]Joey F. George, Kent Marett:
Invited Paper: The Times they are a Changin': How Non-Technology Factors have Affected IS Curriculum over Time. J. Inf. Syst. Educ. 30(4): 222-231 (2019) - 2017
- [j17]Kent Marett, Joey F. George, Carmen C. Lewis, Manjul Gupta, Gabriel A. Giordano:
Beware the dark side: Cultural preferences for lying online. Comput. Hum. Behav. 75: 834-844 (2017) - 2015
- [j16]Jung P. Shim, Rodney A. Pearson, Kent Marett, Charles Moore:
Stretching from Punch Card/Programming to Business Data Processing to Business Information Systems. Commun. Assoc. Inf. Syst. 36: 28 (2015) - [j15]Kent Marett:
Checking the manipulation checks in information security research. Inf. Comput. Secur. 23(1): 20-30 (2015) - [j14]Kent Marett, Emily Garrigues Marett, Shanan R. Litchfield:
The Role of Relational Familiarity When Interpreting Family Business Communication. IEEE Trans. Prof. Commun. 58(1): 69-85 (2015) - 2014
- [j13]Ryan T. Wright, Matthew L. Jensen, Jason Bennett Thatcher, Michael Dinger, Kent Marett:
Research Note - Influence Techniques in Phishing Attacks: An Examination of Vulnerability and Resistance. Inf. Syst. Res. 25(2): 385-400 (2014) - 2013
- [j12]Kenneth J. Harris, Kent Marett, Ranida B. Harris:
An investigation of the impact of abusive supervision on technology end-users. Comput. Hum. Behav. 29(6): 2480-2489 (2013) - [j11]Kent Marett, Robert F. Otondo, G. Stephen Taylor:
Assessing the Effects of Benefits and Institutional Influences on the Continued Use of Environmentally Munificent Bypass Systems in Long-Haul Trucking. MIS Q. 37(4): 1301-1312 (2013) - 2012
- [j10]Kent Marett, Rodney A. Pearson, Robert S. Moore:
Pay What You Want: An Exploratory Study of Social Exchange and Buyer-Determined Prices of iProducts. Commun. Assoc. Inf. Syst. 30: 10 (2012) - [j9]Christie M. Fuller, Douglas P. Twitchell, Kent Marett, A. J. Burns:
The Impact of Ability and Participation on Trustworthiness and Task Performance in Virtual Teams. Int. J. Soc. Organ. Dyn. IT 2(2): 1-17 (2012) - [j8]Pamela E. Carter, Jason Bennett Thatcher, Katherine M. Chudoba, Kent Marett:
Post-Acceptance Intentions and Behaviors: An Empirical Investigation of Information Technology Use and Innovation. J. Organ. End User Comput. 24(1): 1-20 (2012) - [j7]Christie M. Fuller, Kent Marett, Douglas P. Twitchell:
An Examination of Deception in Virtual Teams: Effects of Deception on Task Performance, Mutuality, and Trust. IEEE Trans. Prof. Commun. 55(1): 20-35 (2012) - 2010
- [j6]Ryan T. Wright, Kent Marett:
The Influence of Experiential and Dispositional Factors in Phishing: An Empirical Investigation of the Deceived. J. Manag. Inf. Syst. 27(1): 273-303 (2010) - 2009
- [j5]Kent Marett, K. D. Joshi:
The Decision to Share Information and Rumors: Examining the Role of Motivation in an Online Discussion Forum. Commun. Assoc. Inf. Syst. 24: 4 (2009) - [j4]Ranida B. Harris, Kent Marett:
An Investigation of Liking of Computers, Help Received, and Job Outcomes for Computer Workers. J. Organ. End User Comput. 21(3): 60-79 (2009) - 2008
- [j3]Joey F. George, Kent Marett, Gabriel A. Giordano:
Deception: Toward an Individualistic View of Group Support Systems. J. Assoc. Inf. Syst. 9(10): 3 (2008) - [j2]Joey F. George, David P. Biros, Judee K. Burgoon, Jay F. Nunamaker Jr., Janna M. Crews, Jinwei Cao, Kent Marett, Mark Adkins, John Kruse, Ming Lin:
The Role of E-Training in Protecting Information Assets Against Deception Attacks. MIS Q. Executive 7(2): 5 (2008) - 2005
- [j1]Joey F. George, Kent Marett:
Deception: The Dark Side of E-Collaboration. Int. J. e Collab. 1(4): 24-37 (2005)
Conference and Workshop Papers
- 2024
- [c18]Sumin Kim, Kent Marett:
Security Burnout Dilemma: A Test of the Job Demands - Resources Model. AMCIS 2024 - 2022
- [c17]Joey F. George, Akmal Mirsadikov, Misty Nabors, Kent Marett:
What do Users Actually Look at During 'Zoom' Meetings? Discovery Research on Attention, Gender and Distraction Effects. HICSS 2022: 1-9 - 2020
- [c16]Kent Marett, Misty Nabors:
Local Learning from Municipal Ransomware Attacks. AMCIS 2020 - 2018
- [c15]Kent Marett, Shan Xiao:
Broadband Internet Access as a Localized Facilitator for Improving Security Knowledge. AMCIS 2018 - [c14]Andrew Miller, Kent Marett:
Blame Distribution Following Information Security Breaches. AMCIS 2018 - 2016
- [c13]Joey F. George, Douglas C. Derrick, Andrew J. Harrison, Kent Marett, Jason Bennett Thatcher:
The Dark Internet: Without Darkness There is No Light. AMCIS 2016 - 2014
- [c12]Ryan T. Wright, Kent Marett, Jason Bennett Thatcher:
Extending Ecommerce Deception Theory to Phishing. ICIS 2014 - 2009
- [c11]Kent Marett, Ryan T. Wright:
The Effectiveness of Deceptive Tactics in Phishing. AMCIS 2009: 340 - 2008
- [c10]Gabriel A. Giordano, Joey F. George, Kent Marett, Bryan Keane:
Detecting Deception in Computer-Mediated Interviewing. ECIS 2008: 1826-1834 - 2006
- [c9]Gregory M. Schechtman, Kent Marett, John Wells:
Internet Abuse: A General Theory of Crime Framework. AMCIS 2006: 11 - [c8]David P. Biros, Kent Marett, Brent T. Langhals:
Vigilance and Error Detection in an Automated Command and Control Environment. HICSS 2006 - [c7]Kent Marett, Garry Adams:
The Role of Decision Support in Alleviating the Familiarity Bias. HICSS 2006 - 2005
- [c6]Kent Marett, Joey F. George:
Group Deception in Computer-Supported Environments. HICSS 2005 - [c5]Patti Tilley, Joey F. George, Kent Marett:
Gender Differences in Deception and Its Detection Under Varying Electronic Media Conditions. HICSS 2005 - 2004
- [c4]Joey F. George, Kent Marett:
Inhibiting Deception and Its Detection. HICSS 2004 - [c3]Joey F. George, Kent Marett, Judee K. Burgoon, Janna M. Crews, Jinwei Cao, Ming Lin, David P. Biros:
Training to Detect Deception: An Experimental Investigation. HICSS 2004 - [c2]Joey F. George, Kent Marett, Patti Tilley:
Deception Detection under Varying Electronic Media and Warning Conditions. HICSS 2004 - [c1]Kent Marett, David P. Biros, Monti L. Knode:
Self-efficacy, Training Effectiveness, and Deception Detection: A Longitudinal Study of Lie Detection Training. ISI 2004: 187-200
Parts in Books or Collections
- 2008
- [p1]Joey F. George, Kent Marett:
Deceptive Communication in E-Collaboration. Handbook of Research on Computer Mediated Communication 2008: 297-307
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-14 23:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint