Ryan Wright
Cited by
Cited by
Curriculum guidelines for undergraduate degree programs in information systems
H Topi, KM Kaiser, JC Sipior, JS Valacich, JF Nunamaker Jr, ...
ACM, 2010
Assessing Common Method Bias: Problems with the ULMC Technique
WW Chin, JB Thatcher, RT Wright
MIS Quarterly 86 (1), 114-121, 2012
Operationalizing multidimensional constructs in structural equation modeling: Recommendations for IS research
RT Wright, DE Campbell, JB Thatcher, N Roberts
Communications of the Association for Information Systems 30 (1), 23, 2012
The influence of experiential and dispositional factors in phishing: An empirical investigation of the deceived
RT Wright, K Marett
Journal of Management Information Systems 27 (1), 273-303, 2010
Controlling for common method variance in PLS analysis: the measured latent marker variable approach
WW Chin, JB Thatcher, RT Wright, D Steel
New perspectives in partial least squares and related methods, 231-239, 2013
Shut-up I don't care: Understanding the role of relevance and interactivity on customer attitudes toward repetitive online advertising
DE Campbell, RT Wright
Journal of Electronic Commerce Research 9 (1), 62-76, 2008
Training to mitigate phishing attacks using mindfulness techniques
ML Jensen, M Dinger, RT Wright, JB Thatcher
Journal of Management Information Systems 34 (2), 597-626, 2017
Influence Techniques in Phishing Attacks: An Examination of Vulnerability and Resistance
RT Wright, ML Jensen, JB Thatcher, M Dinger, K Marett
Information Systems Research 25 (2), 385-400, 2014
Mindfulness in Information Technology Use: Definitions, Distinctions, and a New Measure
JB Thatcher, RT Wright, H Sun, TJ Zagenczyk, R Klein
MIS Quarterly 42 (3), 831-847, 2018
Understanding online customers’ ties to merchants: the moderating influence of trust on the relationship between switching costs and e-loyalty
M Carter, R Wright, JB Thatcher, R Klein
European Journal of Information Systems, 2014
Where did they go right? Understanding the deception in phishing communications
R Wright, S Chakraborty, A Basoglu, K Marett
Group Decision and Negotiation 19, 391-416, 2010
Using Expectation Disconfirmation Theory and Polynomial Modeling to Understand Trust in Technology
NK Lankton, DH McKnight, RT Wright, JB Thatcher
Information Systems Research, 2016
Revising the IS Model Curriculum: Rethinking the approach and the Process
H Topi, JS Valacich, K Kaiser, JF Nunamaker Jr, J Sipior, GJ de Vreede, ...
Communications of the Association for Information Systems 20 (1), 45, 2007
Deconstructing and Operationalizing Interactivity: An Online Advertising Perspective
DE Campbell, R Wright, PF Clay
Journal of Information Technology Theory and Application (JITTA) 11 (4), 3, 2011
Validating Work System Principles for Use in Systems Analysis and Design
S Alter, R Wright
International Conference on Information Systems, 2010
Social media and emergency management: Exploring state and local tweets
L Carter, JB Thatcher, R Wright
2014 47th Hawaii International Conference on System Sciences, 1968-1977, 2014
The role of context in IT assimilation: A multi-method study of a SaaS platform in the US nonprofit sector
RT Wright, N Roberts, D Wilson
European Journal of Information Systems 26, 509-539, 2017
Revisiting the impact of system use on task performance: An exploitative-explorative system use framework
H Sun, RT Wright, J Thatcher
Journal of the Association for Information Systems 20 (4), 3, 2019
Moving toward the next generation of graduate degree programs in information systems
H Topi, K Conboy, B Donnellan, V Ramesh, C Van Toorn, RT Wright
Communications of the Association for Information Systems 34 (1), 35, 2014
Combating phishing attacks: A knowledge management approach
M Jensen, A Durcikova, R Wright
The system can't perform the operation now. Try again later.
Articles 1–20