Kent Marett
Title
Cited by
Cited by
Year
The influence of experiential and dispositional factors in phishing: An empirical investigation of the deceived
RT Wright, K Marett
Journal of Management Information Systems 27 (1), 273-303, 2010
2122010
The decision to share information and rumors: Examining the role of motivation in an online discussion forum
K Marett, KD Joshi
Communications of the Association for Information Systems 24 (1), 4, 2009
1622009
Research Note—Influence Techniques in Phishing Attacks: An Examination of Vulnerability and Resistance
RT Wright, ML Jensen, JB Thatcher, M Dinger, K Marett
Information systems research 25 (2), 385-400, 2014
1182014
Assessing the effects of benefits and institutional influences on the continued use of environmentally munificent bypass systems in long-haul trucking
K Marett, RF Otondo, GS Taylor
MIS quarterly, 1301-1312, 2013
782013
Where did they go right? Understanding the deception in phishing communications
R Wright, S Chakraborty, A Basoglu, K Marett
Group Decision and Negotiation 19 (4), 391-416, 2010
632010
Deception detection under varying electronic media and warning conditions
JF George, K Marett, P Tilley
37th Annual Hawaii International Conference on System Sciences, 2004 …, 2004
602004
An examination of deception in virtual teams: Effects of deception on task performance, mutuality, and trust
CM Fuller, K Marett, DP Twitchell
IEEE Transactions on Professional Communication 55 (1), 20-35, 2011
582011
Technology‐related pressure and work–family conflict: Main effects and an examination of moderating variables
KJ Harris, K Marett, RB Harris
Journal of Applied Social Psychology 41 (9), 2077-2103, 2011
502011
Social networking websites and posting personal information: An evaluation of protection motivation theory
K Marett, AL McNab, RB Harris
AIS Transactions on Human-Computer Interaction 3 (3), 170-188, 2011
492011
Deception in the case of one sender and multiple receivers
LK Marett, JF George
Group Decision and Negotiation 13 (1), 29-44, 2004
442004
Pay what you want: An exploratory study of social exchange and buyer-determined prices of iProducts
K Marett, R Pearson, RS Moore
Communications of the Association for Information Systems 30 (1), 10, 2012
382012
Self-efficacy, training effectiveness, and deception detection: A longitudinal study of lie detection training
K Marett, DP Biros, ML Knode
International Conference on Intelligence and Security Informatics, 187-200, 2004
332004
Deception: Toward an individualistic view of group support systems
JF George, K Marett, G Giordano
Journal of the Association for Information Systems 9 (10), 3, 2008
262008
The effects of warnings, computer-based media, and probing activity on successful lie detection
JF George, K Marett, PA Tilley
IEEE Transactions on Professional Communication 51 (1), 1-17, 2008
262008
Training to detect deception: An experimental investigation
JF George, K Marett, J Crews, J Cao, M Lin, DP Biros, JK Burgoon
37th Annual Hawaii International Conference on System Sciences, 2004 …, 2004
242004
Using mobile devices in a high risk context: The role of risk and trust in an exploratory study in Afghanistan
K Marett, AW Pearson, RA Pearson, E Bergiel
Technology in Society 41, 54-64, 2015
232015
Gender differences in deception and its detection under varying electronic media conditions
P Tilley, JF George, K Marett
Proceedings of the 38th Annual Hawaii International Conference on System …, 2005
232005
Inhibiting deception and its detection
JF George, K Marett
37th Annual Hawaii International Conference on System Sciences, 2004 …, 2004
232004
Barriers to deceiving other group members in virtual settings
K Marett, JF George
Group Decision and Negotiation 22 (1), 89-115, 2013
222013
Post-acceptance intentions and behaviors: An empirical investigation of information technology use and innovation
PE Carter, JB Thatcher, KM Chudoba, K Marett
Journal of Organizational and End User Computing (JOEUC) 24 (1), 1-20, 2012
202012
The system can't perform the operation now. Try again later.
Articles 1–20