Kent Marett PhD
Title:
- Professor of Information Systems
Contacts:
lkm2@msstate.edu
Office: (662) 325-7001
302H
Visit Website for Kent Marett
Overview
Education:
- Ph D, Management Information Systems, Florida State University, 2004
- MBA, Business Information Systems, Mississippi State University, 1999
- BS, Secondary Education, Mississippi State University, 1995
Publications
Book, Chapter
- Supporting and facilitating conditions to computer workers who dislike working with computers. Organizations and End User Interactions: New Explorations. Hershey PA: IGI Global Publishing. 272-291. 2011
- Deceptive communication in e-collaboration. Emerging E-Collaboration Concepts and Applications. Ed. N. Kock. Hershey, PA: Idea Group Inc.. 54-68. 2006
- Detecting deception in computer-mediated communication. Computers in Society: Privacy, Ethics, and the Internet. Upper Saddle River, NJ: Prentice-Hall. 154-166. 2003
Conference Proceeding
- Perceived deception: An evaluation of technology awareness and self-efficacy. Dewald Roode Information Security Workshop. 2011
- The effectiveness of deceptive tactics in phishing. Proceedings of the 2009 AIS Americas Conference on Information Systems. 2009
- Detecting deception in computer-mediated interviews. Proceedings of the 2008 European Conference on Information Systems. 2008
- Why did I do that? Understanding the deceptive communication in phishing. Proceedings of the 2007 Hawaii International Conference on System Sciences. 2007
- Internet abuse: A general theory of crime framework. Proceedings of the 2006 AIS Americas Conference on Information Systems. 2006
- The role of decision support in alleviating the familiarity bias. Proceedings of the 2006 Hawaii International Conference on System Sciences. 2006
- Vigilance and error detection in an automated command and control environment. Proceedings of the 2006 Hawaii International Conference on System Sciences. 2006
- Gender differences in deception detection via electronic media. Proceedings of the 2005 Hawaii International Conference on System Sciences. 2005
- Group deception in computer-supported environments. Proceedings of the 2005 Hawaii International Conference on System Sciences. 2005
- Self-efficacy, training effectiveness, and deception detection: A longitudinal study of lie detection training. Proceedings of the 2004 Symposium on Intelligence and Security Informatics. 2004
- Training to detect deception: An experimental investigation. Proceedings of the 2004 Hawaii International Conference on System Sciences. 2004
- Executive use of information technology: What have we been missing?. Proceedings of the 2001 AIS Americas Conference on Information Systems. 2001
- Integrating IT and management accounting information: A conceptual framework. Proceedings of the 2001 AIS Americas Conference on Information Systems. 2001
- Technology's links to the transaction cost and the knowledge-based views of the firm: A synthesis and extension of the literature. Proceedings of the 2001 Meeting of the Southern Management Association. 2001
- The limits of information: Measuring differences between local and distance group attitudes toward distance learning. Procedings of the 2000 AIS Americas Conference on Information Systems. 2000
Journal Article
- Security compliance and work-issued mobile devices: Out of sight, out of mind?. Information Systems & E-Business Management. Volume 21, Issue 4, Pages 913-945. 2023
- Broadband Internet Access as a Localized Resource for Facilitating Information Security Knowledge. Journal of the Midwest Association for Information System. Issue 1, Pages 9-21. 2022
- Local learning from municipal ransomware attacks: A geographically weighted analysis. Information & Management. Volume 58, Issue 7, Page 103482. 2021
- Professionalizing the Information Security of Family Firms: A Family Essence Perspective. Journal of Small Business Management. Volume 58, Issue 2, Pages 390-408. 2020
- The Impact of Awareness of Being Monitored on Computer Usage Policy Compliance: An Agency View. Journal of Information Systems. Volume 34, Issue 1, Pages 135-149. 2020
- The Times They are a Changin’: How Non-Technology Factors have Affected IS Curriculum over Time. Journal of Information Systems Education. Volume 30, Issue 4, Pages 222-231. 2019
- A Quantitative Textual Analysis of Three Types of Threat Communication and Subsequent Maladaptive Responses. Computers & Security. Volume 80, Pages 25-35. 2019
- Information Security Practices in Small-to-Medium Sized Businesses: A Hotspot Analysis. Information Resources Management Journal. Volume 32, Issue 2, Page article 4. 2019
- Socioemotional wealth importance within family firm internal communication. Journal of Family Business Management. 2018
- Beware the Dark Side: Cultural Preferences for Lying Online. Computers in Human Behavior. Volume 75, Pages 834-844. 2017
- An Image of Information Security: Examining the Coping Process by Internet Users. Journal of Information System Security. Volume 12, Issue 1, Pages 3-25. 2016
- Using Mobile Devices in a High Risk Context: The Role of Risk and Trust in an Exploratory Study in Afghanistan. Technology in Society. 2015
- Stretching from Punch Card/Programming to Business Data Processing (BDP) to Business Information Systems (BIS). Communications of the AIS. 2015
- Checking the Manipulation Checks in Information Security Research. Information Management and Computer Security. Volume 25, Issue 1, Pages 20-30. 2015
- The Role of Relational Familiarity When Interpreting Family Business Communication. IEEE Transactions on Professional Communication. Volume 58, Issue 1, Pages 69-85. 2015
- Influence techniques in phishing attacks: An examination of vulnerability and resistance. Information Systems Research. Volume 25, Issue 2, Pages 385-400. 2014
- An Investigation of the Impact of Abusive Supervision on Technology End-Users. Computers in Human Behavior. Volume 29, Issue 6, Pages 2480-2489. 2013
- Assessing the Effects of Benefits and Institutional Influences on the Continued Use of Environmentally Munificent Bypass Systems in Long-Haul Trucking. MIS Quarterly. Volume 37, Issue 4, Pages 1301-1312. 2013
- Barriers to deceiving other group members in virtual settings. Group Decision & Negotiation. Volume 22, Issue 1, Pages 89-115. 2013
- Feedback distractions during computer-mediated . Journal of Managerial Issues. Volume 25, Issue 2, Pages 172-191. 2013
- Pay What You Want: An exploratory study of social exchange and buyer-determined prices of iProducts. Communications of the AIS. Volume 30, Pages 1-14. 2012
- The impact of ability and participation on trustworthiness and task performance in virtual teams. International Journal of Social & Organizational Dynamics in Information Technology. Volume 2, Issue 2, Pages 1-17. 2012
- An examination of deception in virtual teams: Effects of deception on task performance, mutuality, and trust. IEEE Transactions on Professional Communication. Volume 55, Issue 1, Pages 1-16. 2012
- Post-acceptance intentions and behaviors: An empirical investigation of information technology use and innovation. Journal of Organizational and End User Computing. Volume 24, Issue 1, Pages 1-20. 2012
- Reviewers and the detection of deceptive information in recorded interviews. Journal of Applied Social Psychology. Volume 41, Issue 2, Pages 252-269. 2011
- Social networking websites and posting personal information: An evaluation of Protection Motivation Theory. AIS Transactions on Human-Computer Interaction. Volume 3, Issue 3, Pages 170-188. 2011
- Technology-related pressure and WFC: Main effects and an examination of moderating variables. Journal of Applied Social Psychology. Volume 41, Issue 9, Pages 2077-2103. 2011
- The influence of experiential and dispositional factors in phishing: An empirical investigation of the deceived. Journal of Management Information Systems. Volume 27, Issue 1, Pages 273-303. 2010
- Where did they go right? Investigating deception cues in a phishing context. Group Decision & Negotiation. Volume 19, Issue 4, Pages 391-416. 2010
- An investigation of liking of computers, help received, and job outcomes for computer workers. Journal of Organizational and End User Computing. Volume 21, Issue 3, Pages 60-79. 2009
- The decision to share information and rumors: Examining the role of motivation in an online discussion forum. Communications of the AIS. Volume 24, Issue 4, Pages 47-68. 2009
- Deception: Towards an individualistic view of group support systems. Journal of the AIS. Volume 9, Issue 10/11, Pages 653-676. 2008
- The effects of warnings, computer-based media, and probing activity on successful lie detection. IEEE Transactions on Professional Communications. Volume 51, Issue 1, Pages 1-17. 2008
- The role of e-training in protecting information assets against deception attacks. MISQ Executive. Volume 7, Issue 2, Pages 57-69. 2008
- Deception: The dark side of e-collaboration. International Journal of E-Collaboration. Volume 1, Issue 4, Pages 24-37. 2005
- Deception in the case of one sender and multiple receivers. Group Decision & Negotiation. Volume 13, Issue 1, Pages 29-44. 2004
- The truth about lies. HR Magazine. Volume 49, Issue 5, Pages 87-91. 2004
- The limits of information: A cautionary tale about one course delivery experience in the distance education environment. e-Service Journal. Volume 1, Issue 2, Pages 65-81. 2002
Presentations
Oral Presentation
- "Broadband Internet Access as a Localized Facilitator for Improving Security Knowledge." 2018 Americas Conference on Information Systems, AIS, New Orleans LA. 2018
- "The Dark Internet: Without Darkness There is No Light." 2016 Americas Conference on Information Systems, Association for Information Systems, San Diego, CA. 2016
- "Web App Entrepreneurship." Mississippi Broadband Connect Coalition Conference, mbcc.ms, Jackson, MS. 2013
Paper
- "Local Learning from Municipal Ransomware Attacks." Americas Conference on Information Systems (AMCIS), Association for Information Systems (AIS), Salt Lake City UT (held virtually). 2020
- "Extending Ecommerce Deception Theory to Phishing." International Conference on Information Systems (ICIS), AIS, Auckland NZ. 2014
- "Mobile phone use risks and benefits in a high risk context: An Exploratory Study in Afghanistan." 2013 Meeting of the Southern Management Association, , New Orleans, LA. 2013
- "The Role of Personal Experience When Interpreting Family Business Communication ." Theories of Family Enterprise Conference, Center for Family Enterprise Research, Imperial College, London UK. 2013
- "An investigation of the impact of abusive supervision on technology end users." 2013 meeting of the Academic and Business Research Institute, Academic and Business Research Institute, Orlando FL. 2013
- "CollabSec: A multi-‐player game for researching and teaching information system risk assessment." Pre ICIS Workshop on Information Security and Privacy (WISP), AIS Special Interest Group on Information Security and Privacy, Orlando, FL. 2012
- "Examining the Coping Appraisal Process in End User Security." Pre ICIS Workshop on Information Security and Privacy (WISP), AIS Special Interest Group on Information Security and Privacy, Orlando, FL. 2012
- "Feedback distractions during computer-mediated group collaboration." 2011 meeting of the Academy of Management, Academy of Management, San Antonio, TX. 2011
- "Technology-related pressure and WFC: Main effects and an examination of moderating variables." 2009 meeting of the Academy of Management, Academy of Management, Chicago, IL. 2009
Poster
- "Blame Distribution Following Information Security Breaches." 2018 Americas Conference on Information Systems, AIS, New Orleans LA. 2018