Ryan Wright
Cited by
Cited by
Curriculum guidelines for undergraduate degree programs in information systems
H Topi, KM Kaiser, JC Sipior, JS Valacich, JF Nunamaker Jr, ...
Association for Computing Machinery (ACM), 2010
“So what if ChatGPT wrote it?” Multidisciplinary perspectives on opportunities, challenges and implications of generative conversational AI for research, practice and policy
YK Dwivedi, N Kshetri, L Hughes, EL Slade, A Jeyaraj, AK Kar, ...
International Journal of Information Management 71, 102642, 2023
Assessing Common Method Bias: Problems with the ULMC Technique
WW Chin, JB Thatcher, RT Wright
MIS Quarterly 86 (1), 114-121, 2012
Operationalizing multidimensional constructs in structural equation modeling: Recommendations for IS research
RT Wright, DE Campbell, JB Thatcher, N Roberts
Communications of the Association for Information Systems 30 (1), 23, 2012
Controlling for common method variance in PLS analysis: the measured latent marker variable approach
WW Chin, JB Thatcher, RT Wright, D Steel
New perspectives in partial least squares and related methods, 231-239, 2013
The influence of experiential and dispositional factors in phishing: An empirical investigation of the deceived
RT Wright, K Marett
Journal of Management Information Systems 27 (1), 273-303, 2010
Training to mitigate phishing attacks using mindfulness techniques
ML Jensen, M Dinger, RT Wright, JB Thatcher
Journal of Management Information Systems 34 (2), 597-626, 2017
Mindfulness in Information Technology Use: Definitions, Distinctions, and a New Measure
JB Thatcher, RT Wright, H Sun, TJ Zagenczyk, R Klein
MIS Quarterly 42 (3), 831-847, 2018
Shut-up I don't care: Understanding the role of relevance and interactivity on customer attitudes toward repetitive online advertising
DE Campbell, RT Wright
Journal of Electronic Commerce Research 9 (1), 62-76, 2008
Influence Techniques in Phishing Attacks: An Examination of Vulnerability and Resistance
RT Wright, ML Jensen, JB Thatcher, M Dinger, K Marett
Information Systems Research 25 (2), 385-400, 2014
Understanding online customers’ ties to merchants: the moderating influence of trust on the relationship between switching costs and e-loyalty
M Carter, R Wright, JB Thatcher, R Klein
European Journal of Information Systems, 2014
Where did they go right? Understanding the deception in phishing communications
R Wright, S Chakraborty, A Basoglu, K Marett
Group Decision and Negotiation 19, 391-416, 2010
Using Expectation Disconfirmation Theory and Polynomial Modeling to Understand Trust in Technology
NK Lankton, DH McKnight, RT Wright, JB Thatcher
Information Systems Research, 2016
Revising the IS Model Curriculum: Rethinking the approach and the Process
H Topi, JS Valacich, K Kaiser, JF Nunamaker Jr, J Sipior, GJ de Vreede, ...
Communications of the Association for Information Systems 20 (1), 45, 2007
The role of context in IT assimilation: A multi-method study of a SaaS platform in the US nonprofit sector
RT Wright, N Roberts, D Wilson
European Journal of Information Systems 26, 509-539, 2017
Revisiting the impact of system use on task performance: An exploitative-explorative system use framework
H Sun, RT Wright, J Thatcher
Journal of the Association for Information Systems 20 (4), 3, 2019
Deconstructing and Operationalizing Interactivity: An Online Advertising Perspective
DE Campbell, R Wright, PF Clay
Journal of Information Technology Theory and Application (JITTA) 11 (4), 3, 2011
Validating Work System Principles for Use in Systems Analysis and Design
S Alter, R Wright
International Conference on Information Systems, 2010
Social media and emergency management: Exploring state and local tweets
L Carter, JB Thatcher, R Wright
2014 47th Hawaii International Conference on System Sciences, 1968-1977, 2014
Combating phishing attacks: A knowledge management approach
M Jensen, A Durcikova, R Wright
The system can't perform the operation now. Try again later.
Articles 1–20