College of Business Mississippi State University

Faculty & Staff

Dr. Merrill  Warkentin, Ph.D.
  • Dr. Merrill Warkentin, Ph.D.
  • James J. Rouse Professor of Information Systems
  • James J. Rouse Professor of Information Systems
  • m.warkentin@msstate.edu
  • 302
  • Office: 662.325.1955
  • Department: 662.325.3928
  • www.MISProfessor.us

Education

  • Ph.D., University of Nebraska, Management Information Systems
  • MA, University of Nebraska, Economics
  • BA, University of Nebraska, Economics

BIO

Merrill Warkentin is the James J. Rouse Professor of Information Systems in the College of Business at Mississippi State University. His research, primarily on the impacts of organizational, contextual, and dispositional influences on individual behaviors in the context of information security and privacy, has appeared in MIS Quarterly, Decision Sciences, Journal of Management Information Systems, Journal of the Association for Information Systems, European Journal of Information Systems, Information & Management, Decision Support Systems, Information Systems Journal, and others. He is the author or editor of seven books, and has authored or co-authored about 300 published manuscripts, including over 75 peer-reviewed journal articles, with over 11,000 citations (h-index factor = 30). He serves or has served as Associate Editor of MIS Quarterly, Information Systems Research, Decision Sciences, European Journal of Information Systems, Information & Management, and other journals. He is Senior Editor of the AIS Transactions on Replication Research and Eminent Area Editor (MIS) for Decision Sciences. He has held officer and other leadership positions at AIS, DSI, IFIP, and ACM. His work has been funded by NATO, NSF, NSA, DoD, Homeland Security, IBM, and others. He has chaired several international conferences and was the Program Co-Chair for the 2016 AIS Americas Conference on Information Systems (AMCIS).

Recent Publications

2018
  • "Security management techniques responses: Differentiating managers and employees", with Puzant Balozian and Dorothy Leidner, Journal of Computer Information Systems, 2018, p 20.
2017
  • "Shared Benefits and Information Privacy: What Determines Smart Meter Technology Adoption?", with Sanjay Goel and Philip Menard, Journal of the Association for Information Systems, 2017.
  • "The Effect of Belongingness on Obsessive-Compulsive Disorder in the Use of Online Social Networks", with Tabitha L James, Paul Benjamin Lowry, and Linda Wallace, Journal of Management Information Systems, 2017, vol. forthcoming, p 30.
  • "The Effect of Belongingness on Obsessive-Compulsive Disorder in the Use of Online Social Networks", with Tabitha L James, Paul Benjamin Lowry, and Linda Wallace, Journal of Management Information Systems, 2017, vol. 34, no. 2, p 560-596.
2016
2015
  • "A Dual Privacy Decision Model for Online Social Networks", with Tabitha L James and Stephane E Collignon, Information & Management, 2015, vol. 52, no. 8, p 893-908.
  • "The Best Thinking in Business Analytics from the Decision Sciences Institute", Pearson/FT Press, 2015.
  • "Trends and Research in the Decision Sciences 2015 ", Pearson/FT Press, 2015.
  • "Implications of Monitoring Mechanisms on Bring Your Own Device Adoption", with James Lee, Robert E. Crossler, and Robert Otondo, Journal of Computer Information Systems, 2015, vol. forthcoming, p N/A.
  • "Exploring effects of media type and delivery technology on facilitating critical thinking among college students", Journal of Educational Technology Systems, 2015, vol. 44, no. 1, p 22-35.
  • "Cross-Cultural IS Research: Perspectives from Eastern and Western Traditions", with Brigitte Charles-Pauvers and Patrick Y.K. Chau, European Journal of Information Systems, 2015, vol. 24, no. 3, p 229-233.
  • "Teaching Social Media in Business", with Roger McHaney, David Sachs, Michael Brian Pope, and Dustin Ormond, Journal of Information Technology Education: Innovations in Practice, 2015, vol. 14, p 39-62.
  • "Examining the Moderating Role of Sense of Virtual Community in Online Review Evaluation", with Chuan Luo, Yun Xu, Xin Luo, and Choon Ling Sia, Information & Management, 2015, vol. 52, no. 3, p 305-316.
  • "Personality, attitudes, and intentions: Predicting initial adoption of information security behavior", with Jordan Shropshire and Shwadhin Sharma, Computers & Security, 2015, vol. 29, no. March, p 177-191.
  • "An Enhanced Fear Appeal Framework: Leveraging Threats to the Human Asset through Sanctioning Rhetoric", with Allen C. Johnston and Mikko Siponen, MIS Quarterly, 2015, vol. 39, no. 1, p 113-134 plus A1-A7.
  • "Update on Decision Sciences Journal", with Tom Stafford, Decision Line, 2015, p 9.
  • "Is This a Joke? The Impact of Message Manipulations on Risk Perceptions", with Dustin Ormond, Journal of Computer Information Systems, 2015, vol. 55, no. 2, p 9-19.
2014
  • "Information systems security Wiley Encyclopedia of Management (3e)", , 2014.
  • "Trends and Research in the Decision Sciences", Pearson/FT Press, 2014, p 1-377.
  • "Information systems security Wiley Encyclopedia of Management (3e)", , 2014.
  • "Don't Make Excuses!: Discouraging Neutralization to Reduce IT Policy Violation", with Jordan B. Barlow, Dustin Ormond, and Alan R. Dennis, Computers & Security, 2014, vol. 39, p 145-159.
  • "Research in Behavioral Information Security Management Information Systems and Information Technology, Volume 2 (Computing Handbook Set, Third Edition)", with Leigh A. Mutchler, Taylor and Francis, 2014.
  • "Threat Protection and Convenience: Antecedents of Cloud-based Data Backup", with Phil Menard and Robert Gatlin, Journal of Computer Information Systems, 2014, vol. 55, no. 1, p 83-91.
2013
  • "Implications of Monitoring Mechanisms on Bring Your Own Device (BYOD) Adoption", with James Lee Jr. and Robert E. Crossler, Proceedings of the 2013 International Conference on Information Systems, 2013.
  • "Complex Multi-Factor Trust in the Online Environment Psychology of Trust: New Research", with James Lee and Allen C. Johnston, Nova Science Publishers, 2013, p 157-170.
  • "Developing scales to measure constructs for a privacy calculus and information privacy behaviors specific to social computing technologies", with Tabitha James and Stéphane E. Collignon, Proceedings of the 2013 IFIP 8.11/11.13 Dewald Roode Information Security Research Workshop, 2013.
  • "I’m Safer than You: The Role of Optimism Bias in Personal IT Risk Assessments,", with Zhengchuan Xu and Leigh A. Mutchler, Proceedings of the 2013 IFIP 8.11/11.13 Dewald Roode Information Security Research Workshop, 2013.
  • "Consumer Acceptance of Smart Metering Technology", with Sanjay Goel and Philip Menard, Proceedings of the Annual Symposium on Information Assurance, 2013.
  • "What Drives Perceptions of Threats to Your Facebook Friends’ Information?", with Tabitha James, Stéphane E. Collignon, and Byung C. Kim, Proceedings of the Annual Symposium on Information Assurance, 2013.
  • "Understanding Technology Adoption Trade-offs: A Conjoint Analysis", with Xin (Robert) Luo and Han Li, Journal of Computer Information Systems, 2013, vol. 53, no. 3, p 65-74.
  • "Beyond Deterrence: An Expanded View of Employee Computer Abuse", with Robert Willison, MIS Quarterly, 2013, vol. 37, no. 1, p 1-20.
2012
  • "Identifying the Neural Correlates of Protection Motivation for Secure IT Behaviors", with Eric A. Walden, Allen C. Johnston, and Detmar W. Straub, Gmunden Retreat on NeuroIS 2012, 2012, p 6.
  • "Impact of Protection Motivation and Deterrence on IS Security Policy Compliance: A Multi-Cultural View", with Nirmalee Malimage and Kalana Malimage, Proceedings of the Workshop on Information Security and Privacy (WISP), 2012.
  • "One Size Doesn’t Fit All: Cyber Security Training Should be Customized", with Maranda McBride and Lemuria Carter, Institute for Homeland Security Systems, 2012.
  • "The Role of Situational Factors and Personality on Cybersecurity Policy Violation", with Maranda McBride and Lemuria Carter, Institute for Homeland Security Systems, 2012.
  • "Impact of Employment Status on Information Security Policy Compliance", with Shwadhin Sharma, Proceedings of the National Decision Sciences Institute (DSI) Annual Conference, 2012.
  • "Individualized Security Training System", with Maranda McBride, Lemuria Carter, and Allen C. Johnston, Proceedings of the National Decision Sciences Institute (DSI) Annual Conference, 2012.
  • "Message Quality and Quantity Manipulations and their Effects on Perceived Risk", with Dustin Ormond, Proceedings of the National Decision Sciences Institute (DSI) Annual Conference, 2012.
  • "Don’t Make Excuses!: Framing Security Training to Reduce Neutralization for Policy Violation", with Jordan B. Barlow, Dustin Ormond, and Alan R. Dennis, Proceedings of the 2012 International Federation of Information Processing (IFIP) International Workshop on Information Systems Security Research, 2012.
  • "Lie to Me: Gender Deception and Detection in Computer-Mediated Communications", with Shuyuan Mary Ho and Roberto Salome, Proceedings of the 2012 International Federation of Information Processing (IFIP) International Workshop on Information Systems Security Research, Dewald Roode Information Security Workshop, 2012.
  • "The Role of Habit on Information Security Behaviors", with Kalana Malimage and Robert E. Crossler, Proceedings of the 2012 International Federation of Information Processing (IFIP) International Workshop on Information Systems Security Research, Dewald Roode Information Security Workshop, 2012.
  • "Are You Sure You Are Safe?: Perceived Security Protection as an Enabler of Risky IT Behavior", with Robert E. Crossler and Nirmalee Malimage, Proceedings of the 2012 International Federation of Information Processing (IFIP) International Workshop on Information Systems Security Research, Dewald Roode Information Security Workshop, 2012.
  • "Exploring the Role of Individual Employee Characteristics and Personality on Employee Compliance with Cybersecurity Policies", with Maranda McBride, Lemuria Carter, and Allen C. Johnston, Proceedings of the Eighteenth Americas Conference on Information Systems, 2012.
  • "Government of the People, By the People, For the People: A Look at Trust in eGovernment", with Shwadhin Sharma, David Gefen, Paul A. Pavlou, and Gregory M. Rose, Proceedings of the Eighteenth Americas Conference on Information Systems, 2012.
  • "Overcoming Mixed-Gender Requirements Misspecification with the Modified Coherence Method", with Nirmalee Malimage, Proceedings of the Eighteenth Americas Conference on Information Systems, 2012.
  • "Digital Steganography: An Introduction to Techniques and Tools", with Michael Pope, Ernst Bekkering, and Mark B. Schmidt, Communications of the AIS, 2012, vol. 30, no. 1, p 347-366.
  • "Measuring Secure Behavior: A Research Commentary", with Detmar Straub and Kalana Malimage, Proceedings of the Annual Symposium on Information Assurance, 2012, p 1-8.
  • "The Domain Name System – Past, Present, and Future", with Michael Pope, Leigh Junkin Mutchler, and Xin Luo, Communications of the AIS, 2012, vol. 30, no. 1, p 329-346.

Recent Presentations

2018
  • "How Do You Handle It?: Developing a Theory of Facebook Affordances and Envy", with Linda Wallace and Izak Benbasat, Hawaii International Conference on System Sciences (HICSS), Hawaii, HI, USA, 2018.
2017
  • "The Role of Abusive Supervision and Reactive Computer Abuse: A Multi-level Analysis", with Carol Hsu, Xin Luo, and Feng Xu, IFIP 8.11/11.13 Dewald Roode Workshop on Information Systems Security Research, Tampa, FL, USA, 2017.
  • "Developing Measurement Scales for Passwords Uniqueness and Secrecy", with Ali Vedadi, Americas Conference on Information Systems (AMCIS), Boston, MA, USA, 2017.
  • "Understanding Nuances of Privacy and Security in the Context of Information Systems", with Ersin Dincelli and Sanjay Goel, Americas Conference on Information Systems (AMCIS), Boston, MA, USA, 2017.
2016
  • "Does Risk Disposition Play a Role in Influencing Decisions to Behave SECUREly?", with Sanjay Goel, Kevin Williams, and Karen Renaud, Dewald Roode Workshop on Information Security Research, Albuquerque, NM, 2016.
  • "Priming to Elicit Protection Motivated Behaviors: A Research Proposal", with Randall Minas, Allen C. Johnston, Alan R. Dennis, and Philip Menard, Dewald Roode Workshop on Information Security Research, Albuquerque, NM, 2016.
  • "Toward Cognitive Immunization of Potential Criminals against Cyberterrorism", with Joshua M. Regan and Amin G. Kosseim, 11th Annual Symposium on Information Assurance (ASIA), Albany, New York, 2016.
2015
  • "The influence of message and hazard characteristics on intended behavior in three weather climate scenarios", with K. Sherman-Morris, L. Strawderman, K. S. McNeal, Philip Menard, and D. Carruth, 10th Symposium on Societal Applications: Policy, Research, and Practice, Phoenix, AZ, 2015.
  • "Fast decisions: The role of expert and strategic intuition in individual computer security hygiene decisions", with E. Walden, A. C. Johnston, and C. Claesson, 2015 IFIP Dewald Roode Workshop on Information Security Research, Delaware, 2015.
  • "Climate risk perceptions and behavioral intent related to climate change and economic cost", with K. S. McNeal, K. Sherman-Morris, Philip Menard, and L. Strawderman, Geological Society of America National Conference, , 2015.
  • "Emerging threats to internet security and privacy: The new online environment", International Conference on Management of e-Commerce and e-Government, Hangzhou, China, 2015.
  • "How direct and vicarious experience promotes security hygiene", with Leigh Junkin Mutchler, Proceedings of the 10th Annual Symposium of Information Assurance, Albany, NY, 2015.
  • "Introduction to the HICSS-48 minitrack on innovative behavioral IS security and privacy research", with A. Vance and A. C. Johnston, Proceedings of the 2015 Hawaii Information Conference on Systems Science, Hawaii, 2015.
2013
  • "I’m Game, Are you? Factors that Lead to Employee Engagement in Social Media Games", with Bradley Trinkle and Robert E. Crossler, Information Systems, Statistics, and Management Science Research Workshop, Tuscaloosa, AL, 2013.
2012
  • "Antecedents of Auditor Standards Violations", with Bradley Trinkle, Nirmalee Malimage, and Kalana Malimage, Decision Sciences Institute Annual Meeting, San Francisco, CA, 2012.
  • "Challenges and Opportunities for Publishing Information Security Research", with Richard Baskerville and France Bélanger, Dewald Roode Workshop on Information Systems Security Research, Provo, UT, 2012.
  • "Latent Curve Modeling for Factorial Survey Designs", with Robert Otondo and Robert E. Crossler, Dewald Roode Workshop on Information Systems Security Research, Provo, Utah, 2012.