Follow
Ryan Wright
Title
Cited by
Cited by
Year
Curriculum guidelines for undergraduate degree programs in information systems
H Topi, KM Kaiser, JC Sipior, JS Valacich, JF Nunamaker Jr, ...
ACM, 2010
7812010
Assessing Common Method Bias: Problems with the ULMC Technique
WW Chin, JB Thatcher, RT Wright
MIS Quarterly 86 (1), 114-121, 2012
3902012
Operationalizing multidimensional constructs in structural equation modeling: Recommendations for IS research
RT Wright, DE Campbell, JB Thatcher, N Roberts
Communications of the Association for Information Systems 30 (1), 23, 2012
3002012
The influence of experiential and dispositional factors in phishing: An empirical investigation of the deceived
RT Wright, K Marett
Journal of Management Information Systems 27 (1), 273-303, 2010
2802010
Controlling for common method variance in PLS analysis: the measured latent marker variable approach
WW Chin, JB Thatcher, RT Wright, D Steel
New perspectives in partial least squares and related methods, 231-239, 2013
2502013
Shut-up I don't care: Understanding the role of relevance and interactivity on customer attitudes toward repetitive online advertising
DE Campbell, RT Wright
Journal of Electronic Commerce Research 9 (1), 62-76, 2008
2112008
Training to mitigate phishing attacks using mindfulness techniques
ML Jensen, M Dinger, RT Wright, JB Thatcher
Journal of Management Information Systems 34 (2), 597-626, 2017
1872017
Influence Techniques in Phishing Attacks: An Examination of Vulnerability and Resistance
RT Wright, ML Jensen, JB Thatcher, M Dinger, K Marett
Information Systems Research 25 (2), 385-400, 2014
1782014
Mindfulness in Information Technology Use: Definitions, Distinctions, and a New Measure
JB Thatcher, RT Wright, H Sun, TJ Zagenczyk, R Klein
MIS Quarterly 42 (3), 831-847, 2018
1732018
Understanding online customers’ ties to merchants: the moderating influence of trust on the relationship between switching costs and e-loyalty
M Carter, R Wright, JB Thatcher, R Klein
European Journal of Information Systems, 2014
982014
Where did they go right? Understanding the deception in phishing communications
R Wright, S Chakraborty, A Basoglu, K Marett
Group Decision and Negotiation 19, 391-416, 2010
842010
Using Expectation Disconfirmation Theory and Polynomial Modeling to Understand Trust in Technology
NK Lankton, DH McKnight, RT Wright, JB Thatcher
Information Systems Research, 2016
582016
Revising the IS Model Curriculum: Rethinking the approach and the Process
H Topi, JS Valacich, K Kaiser, JF Nunamaker Jr, J Sipior, GJ de Vreede, ...
Communications of the Association for Information Systems 20 (1), 45, 2007
532007
Deconstructing and Operationalizing Interactivity: An Online Advertising Perspective
DE Campbell, R Wright, PF Clay
Journal of Information Technology Theory and Application (JITTA) 11 (4), 3, 2011
392011
Validating Work System Principles for Use in Systems Analysis and Design
S Alter, R Wright
International Conference on Information Systems, 2010
382010
Social media and emergency management: Exploring state and local tweets
L Carter, JB Thatcher, R Wright
2014 47th Hawaii International Conference on System Sciences, 1968-1977, 2014
342014
The role of context in IT assimilation: A multi-method study of a SaaS platform in the US nonprofit sector
RT Wright, N Roberts, D Wilson
European Journal of Information Systems 26, 509-539, 2017
332017
Revisiting the impact of system use on task performance: An exploitative-explorative system use framework
H Sun, RT Wright, J Thatcher
Journal of the Association for Information Systems 20 (4), 3, 2019
312019
Moving toward the next generation of graduate degree programs in information systems
H Topi, K Conboy, B Donnellan, V Ramesh, C Van Toorn, RT Wright
Communications of the Association for Information Systems 34 (1), 35, 2014
282014
Combating phishing attacks: A knowledge management approach
M Jensen, A Durcikova, R Wright
232017
The system can't perform the operation now. Try again later.
Articles 1–20