Ryan Wright

ORCID: 0000-0002-9719-415X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Technology Adoption and User Behaviour
  • Spam and Phishing Detection
  • Information Systems Education and Curriculum Development
  • Digital Marketing and Social Media
  • Customer Service Quality and Loyalty
  • Knowledge Management and Sharing
  • Misinformation and Its Impacts
  • Cybercrime and Law Enforcement Studies
  • Information and Cyber Security
  • Big Data and Business Intelligence
  • Open Education and E-Learning
  • Network Security and Intrusion Detection
  • Information Systems Theories and Implementation
  • Team Dynamics and Performance
  • Deception detection and forensic psychology
  • Information Technology Governance and Strategy
  • Advanced Malware Detection Techniques
  • Particle Detector Development and Performance
  • FinTech, Crowdfunding, Digital Finance
  • Blockchain Technology Applications and Security
  • Experimental Learning in Engineering
  • Impact of Technology on Adolescents
  • Terrorism, Counterterrorism, and Political Violence
  • Social Media and Politics
  • Superconducting Materials and Applications

University of Virginia
2017-2023

College of Charleston
2023

Bournemouth University
2023

London School of Economics and Political Science
2023

University of Central Florida
2023

University of Pretoria
2023

Aalto University
2023

AID Atlanta
2023

National University of Singapore
2023

Informa (Sweden)
2023

Transformative artificially intelligent tools, such as ChatGPT, designed to generate sophisticated text indistinguishable from that produced by a human, are applicable across wide range of contexts. The technology presents opportunities well as, often ethical and legal, challenges, has the potential for both positive negative impacts organisations, society, individuals. Offering multi-disciplinary insight into some these, this article brings together 43 contributions experts in fields...

10.1016/j.ijinfomgt.2023.102642 article EN cc-by-nc-nd International Journal of Information Management 2023-03-11

IS 2010 is the latest in a series of model curricula for undergraduate degrees Information Systems. It builds on foundation formed by this earlier work, but it major revision curriculum and incorporates several significant new characteristics. third collaborative effort ACM AIS. Both organizations have worldwide membership, and, therefore, includes elements that make more universally adaptable than its predecessors. not directly linked to degree structure any specific environment provides...

10.17705/1cais.02618 article EN Communications of the Association for Information Systems 2010-01-01

Recent work, in journals such as MIS Quarterly and Management Science, has highlighted the importance of evaluating influence common method bias (CMB) on results statistical analysis. In this research note, we assess utility unmeasured latent construct (ULMC) approach partial least squares (PLS), introduced by Liang et al. (2007). Such an assessment ULMC is important, because it been employed 76 studies since appeared early 2007. Using data generated via Monte Carlo simulations, use PLS...

10.2307/41703491 article EN MIS Quarterly 2012-01-01

Mindfulness is an important emerging topic. Individual mindfulness in IT use has not been studied systematically. Through three programmatic empirical studies, this paper develops a scale for and tests its utility the post-adoption sys

10.25300/misq/2018/11881 article EN MIS Quarterly 2018-03-03

Although scholars have provided advice regarding how to conceptualize multidimensional constructs, less attention has been directed on evaluate structural equation models that include constructs. Further, the extant information systems literature little, and sometimes contradictory, direction operationalize This gap in we approach constructs merits because: (1) establishing construct validity is critical testing theory (2) recent advances software enable with more readily. Therefore, this...

10.17705/1cais.03023 article EN Communications of the Association for Information Systems 2012-01-01

Abstract Phishing has been a major problem for information systems managers and users several years now. In 2008, it was estimated that phishing resulted in close to $50 billion damages U.S. consumers businesses. Even so, research yet explore many of the reasons why Internet continue be exploited. The goal this paper is better understand behavioral factors may increase one's susceptibility complying with phisher's request personal information. Using past on deception detection, model...

10.2753/mis0742-1222270111 article EN Journal of Management Information Systems 2010-07-01

Phishing attacks are at a record high and causing billions of dollars in losses. To mitigate phishing's impact, organizations often use rule-based training to teach individuals identify certain cues or apply set rules avoid phishing attacks. The approach has improved organizational defenses against phishing; however, regular repetition may not yield increasing resistance expand the toolkit available combat attacks, we used mindfulness theory develop novel that can be performed after familiar...

10.1080/07421222.2017.1334499 article EN Journal of Management Information Systems 2017-04-03

Phishing is a major threat to individuals and organizations. Along with billions of dollars lost annually, phishing attacks have led significant data breaches, loss corporate secrets, espionage. Despite the threat, potential targets little theoretical or practical guidance on which tactics are most dangerous require heightened caution. The current study extends persuasion motivation theory postulate why certain influence techniques especially when used in attacks. We evaluated our hypotheses...

10.1287/isre.2014.0522 article EN Information Systems Research 2014-06-01

Trust in technology is an emerging research domain that examines trust the artifact instead of people. Although previous finds can predict important outcomes, little has examined effect unmet expectations on trusting intentions. Furthermore, both and expectation disconfirmation theories suggest effects may be more complex than linear model depicts. However, this complexity only exist under certain contextual conditions. The current study contributes to literature by introducing a nonlinear...

10.1287/isre.2015.0611 article EN Information Systems Research 2016-02-29

Anomaly detectors are often used to produce a ranked list of statistical anomalies, which examined by human analysts in order extract the actual anomalies interest. This can be exceedingly difficult and time consuming when most high-ranking false positives not interesting from an application perspective. In this paper, we study how reduce analyst's effort incorporating their feedback about whether they investigate interest or not. particular, will adjust anomaly ranking after every analyst...

10.1145/3219819.3220083 article EN 2018-07-19

As the highest level of cloud computing delivery model, Software-as-a-Service (SaaS) has gained considerable popularity in industry as a new way deploying IT solutions, due to its low cost and high elasticity. However, business model associated with SaaS highlights importance for vendors understand how retain customers hyper-competitive market. In particular, increasing customer retention preventing from replacing adopted applications become crucial task all vendors. this study, using...

10.25300/misq/2020/13216 article EN MIS Quarterly 2020-12-01

Phishing is an increasing threat that causes billions in losses and damage to productivity, trade secrets, reputations each year. This work explores how security gamification techniques can improve phishing reporting. We contextualized the cognitive evaluation theory (CET) as a kernel constructed prototype reporting system. With three experiments simulated setting, we tested elements of validation, attribution, incentives, public presentation for improvements experiential (e.g., motivation)...

10.1080/07421222.2022.2096551 article EN Journal of Management Information Systems 2022-07-03

How information systems impact task performance has attracted a significant amount of attention from researchers and generated high interest among practitioners. A commonly accepted view is that the potential must be realized through system use. Nevertheless, existing findings regarding use on are not yet conclusive. We attributed this to various conceptualizations unclear mechanisms which influences performance. Thus, research attempts create better understanding how To end, we developed an...

10.17705/1jais.00539 article EN Journal of the Association for Information Systems 2019-01-01

10.2307/1334251 article EN Harvard Law Review 1937-12-01

Social media for emergency management has emerged as a vital resource government agencies across the globe.In this study, we explore social strategies employed by governments to respond major weather-related events.Using monitoring software, analyze how is used in six cities following storms winter of 2012.We listen, monitor, and assess online discourse available on full range outlets (e.g., Twitter, Facebook, blogs).To glean further insight, conduct survey extract themes from citizen...

10.1109/hicss.2014.249 article EN 2014-01-01

This paper summarizes the key elements of a panel presentation at Americas Conference for Information Systems (AMCIS) 2007 that reviewed current status joint Association Computing Machinery (ACM)/Association (AIS) undergraduate information systems model curriculum revision project. After providing brief historical overview IS curricula and describing reasons why is overdue, focuses on three main aspects proposal. These include: 1) extending reach applicability beyond business schools making...

10.17705/1cais.02045 article EN Communications of the Association for Information Systems 2007-01-01

This paper explores how an organization can utilize its employees to combat phishing attacks collectively through coordinating their activities create a human firewall. We knowledge management research on sharing guide the design of experiment that central reporting and dissemination platform for attacks. The 2x2 tests effects public attribution (to first person message) validation (by security team) messages motivation accuracy. Results demonstrate techniques are transferable organizational...

10.24251/hicss.2017.520 article EN cc-by-nc-nd Proceedings of the ... Annual Hawaii International Conference on System Sciences/Proceedings of the Annual Hawaii International Conference on System Sciences 2017-01-01
Coming Soon ...