Dr. Merrill Warkentin

Professor of MIS and Drew Allen Endowed Fellow

office:  302Q McCool Hall
office phone:  (662) 325-1955
department phone:  (662) 325-3928
fax number:  (662) 325-8651

mailing address:   Management & Information Systems Department
P.O. Box 9581
Mississippi State, MS 39762-9581

e-mail:  m.warkentin@msstate.edu
personal web page:  http://www.MISProfessor.us
related web page:  http://scholar.google.com/citations?hl=en&user=xEkLk5YAAAAJ&view_op=list_works&pagesize=100



Academic History
YearDegreeMajor AreaInstitution
1986PhDManagement Information SystemsUniversity of Nebraska-Lincoln (UNL)
1996 "The Art & Craft of Discussion Leadership" (Seminar)Harvard Business School
1983MAEconomicsUniversity of Nebraska-Lincoln (UNL)
1981BAEconomicsUniversity of Nebraska-Lincoln (UNL)



Courses Taught
Course
Code
Course DescriptionCourse web siteSyllabusOnline Grades
BIS 1012Introduction to Business Computer Systems   
BIS 3233Management Information Systems   
BIS 4753Structured Systems Analysis and Design   
BIS 6990Web 2.0 and Social Media Management   
BIS 8213Advanced Systems Development and Administration   
BIS 8313Advanced Database Design Administration   
BIS 8613MIS Administration   
BIS 9213Advanced Topics in MIS Research   
BIS 9613Information Security Research Design   



Work Experience
YearDescription
2003-presentProfessor of MIS and the Richard Adkerson Scholar at Mississippi State University
2001-2003Associate Professor of MIS at Mississippi State University
1994-2001Joseph G. Riesman Research Professor and Associate Professor of MIS at Northeastern University, MIS Area Coordinator, Director of eCommerce programs
1992-1994Associate Professor of CIS at Bryant University, Director of Center of Applied Information Technology Research
1987-1992Assistant Professor of MIS at George Mason University, Co-Director of Center for Business Expert Systems Research
1986Instructor of Computer Science at Doane College
1983-1986Research Associate, Bureau of Business Research, College of Business Admin, University of Nebraska-Lincoln
1981-1983Research Assistant and Instructor, Department of Economics, University of Nebraska-Lincoln
1975-1981positions in Data Processing, Sales and Sales Management, and Research Support



Journal Articles
YearDescription
 Note: I have over 25 articles currently under review, many of which have revise and resubmit status, mostly at AIS Basket journals such as MISQ, ISR, JMIS, JAIS, and EJIS.
2015Johnston, Allen C., Merrill Warkentin, and Mikko Siponen. “An Enhanced Fear Appeal Framework: Leveraging Threats to the Human Asset through Sanctioning Rhetoric,” MIS Quarterly, Vol. 39, No. X, forthcoming, 2015.
2014Trinkle, Brad S., Robert E. Crossler, and Merrill Warkentin. “I’m game, are you? Reducing Real-World Security Threats by Managing Employee Activity in Virtual Environments” Journal of Information Systems, forthcoming, 2014.
2014Ormond, Dustin and Merrill Warkentin. “Is This a Joke? The Impact of Message Manipulations on Risk Perceptions,” Journal of Computer Information Systems, forthcoming, 2014.
2014Menard, Philip, Robert Gatlin, and Merrill Warkentin. "Threat Protection and Convenience: Antecedents of Cloud-based Data Backup," Journal of Computer Information Systems, Volume 55, No. 1, Fall 2014, pp. 83-91.
2013Willison, Robert and Merrill Warkentin. "Beyond Deterrence: An Expanded View of Employee Computer Abuse," MIS Quarterly, March 2013, Volume 37, Issue 1, pp. 1-20.
2013Pope, Michael Brian, Merrill Warkentin, and Xin (Robert) Luo. “Evolutionary Malware: Mobile Malware, Botnets, and Malware Toolkits,” International Journal of Wireless Networks and Broadband Technologies, Vol. 2, No. 3, 2013, pp. 52-60.
2013Barlow, Jordan B., Merrill Warkentin, Dustin Ormond, and Alan R. Dennis. “Don't Make Excuses!: Discouraging Neutralization to Reduce IT Policy Violation,” Computers & Security 39, Part B, November 2013, pp. 145-159.
2013Crossler, Robert E., Allen C. Johnston, Paul Benjamin Lowry, Qing Hu, Merrill Warkentin, and Richard Baskerville, "Future Directions for Behavioral Information Security Research," Computers & Security, 2013, Volume 32, Issue 1, pp. 90-101.
2013Luo, Xin, Merrill Warkentin, and Han Li. "Understanding Technology Adoption Trade-offs: A Conjoint Analysis," Journal of Computer Information Systems, Vol. 53, Number 3, Spring 2013, pp. 65-74.
2012Warkentin, Merrill, Vijayan Sugumaran, and Robert Sainsbury. "The Role of Intelligent Agents and Data Mining in Electronic Partnership Management," Expert Systems with Applications, Vol. 39, Issue 18, pp. 13277-13288.
2012Pope, Michael Brian, Merrill Warkentin, Ernst Bekkering, and Mark Schmidt. "Digital Steganography " An Introduction to Techniques and Tools," Communications of the AIS, Volume 30, Issue 2, Article 22, pp. 347-366.
2012Pope, Michael Brian, Merrill Warkentin, Leigh A. Mutchler, and Xin Luo. "The Domain Name System: Past, Present, and Future," Communications of the AIS, Volume 30, Issue 1, Article 21, pp. 329-346.
2011Warkentin, Merrill, Allen C. Johnston, and Jordan Shropshire. "The Influence of the Informal Social Learning Environment on Information Privacy Policy Compliance Efficacy and Intention," European Journal of Information Systems, Vol. 20, No. 3, pp. 267-284.
2011Li, Han, Ashish Gupta, Xin Luo, and Merrill Warkentin. "Exploring the Impact of Instant Messaging on Subjective Task Complexity and User Satisfaction," European Journal of Information Systems, Vol. 20, No. 2, 2011, pp. 139-155
2010Shropshire, Jordan D., Merrill Warkentin, and Allen C. Johnston. "Impact of Negative Message Framing on Security Adoption," Journal of Computer Information Systems, Vol. 51, No. 1, Fall 2010, pp. 41-51.
2010Johnston, Allen C. and Merrill Warkentin. "Fear Appeals and Information Security Behaviors: An Empirical Study," MIS Quarterly, Vol. 34, Number 3, September 2010, pp. 549-566 and A1-A4. (click here for Appendices)
2010Johnston, Allen C. and Merrill Warkentin. "The Influence of Perceived Source Credibility on End User Attitudes and Intentions to Comply with Recommended IT Actions," Journal of Organizational and End User Computing, Volume 22, Number 3, September 2010, pp. 1-21. (Chosen as the Best Published Journal Article in JOEUC for 2010.)
2009Bekkering, Ernst, Allen C. Johnston, Merrill Warkentin, and Mark B. Schmidt. "An Empirical Assessment of Technology Adoption as a Choice Between Alternatives," Information Resources Management Journal, Vol. 22, Number 4, Oct-Dec 2009, pp. 23-44.
2009Warkentin, Merrill and Robert Willison. "Behavioral and policy issues in information systems security: The insider threat," European Journal of Information Systems, Volume 18, Issue 2, 2009, pp. 101-105.
2009Warkentin, Merrill, Robert S. Moore, Ernst Bekkering, and Allen C. Johnston. "Analysis of Systems Development Project Risks: An Integrative Framework," DATABASE for Advances in Information Systems, Vol. 40, No. 2, May 2009, pp. 8-27.
2008Warkentin, Merrill, Ernst Bekkering, and Mark B. Schmidt. "Steganography: Forensic, Security, and Legal Issues," Journal of Digital Forensics, Security and Law, Volume 3, Number 2, 2008, pp. 17-33.
2008Johnston, Allen C. and Merrill Warkentin. "Information Privacy Compliance in the Healthcare Industry: Do Healthcare Professionals Want to Comply with HIPAA?", Information Management & Computer Security, Vol. 16, Issue 1, January 2008, pp. 5-19.
2006Johnston, Allen C. and Merrill Warkentin. "An XML-Based Intelligent Agent Protocol Design Framework for Individualized Privacy Postures within Trusted Network Environments," Journal of Information Privacy and Security, Vol. 2, Issue 1, 2006, pp. 16-28.
2005Warkentin, Merrill, Xin Luo, and Gary F. Templeton, "A Framework for Spyware Assessment," Communications of the ACM, Volume 48, Issue 8, August 2005, pp. 79-84. (translated into Japanese as Warkentin, Merrill, Xin Luo, and Gary F. Templeton (2006) "A Framework for Spyware Assessment," Communications of the ACM, Japanese Edition, Vol. 5, No. 2, N1, pp. 43-49).
2005Gefen, David, Gregory M. Rose, Merrill Warkentin, and Paul A. Pavlou. "Cultural Diversity and Trust in IT Adoption: A Comparison of USA and South African e-Voters," Journal of Global Information Management, Vol. 13, No. 1, Jan-Mar 2005, pp. 54-78.
2004Warkentin, Merrill, Kimberly Davis, and Ernst Bekkering. "Introducing the Check-Off Password System (COPS): An Advancement in User Authentication Methods and Information Security," Journal of Organizational and End User Computing (formerly Journal of End User Computing), Volume 16, Number 3, July-September 2004, pp. 41-58.
2003Lueg, Jason E., Robert S. Moore, and Merrill Warkentin, "Patient Health Information Search: An Exploratory Model of Web-Based Search Behavior," Journal of End User Computing, Vol. 15, No. 4 , October-December 2003, pp. 49-61.
2002Warkentin, Merrill, David Gefen, Pavlos Pavlou, and Greg Rose. "Encouraging Citizen Adoption of eGovernment by Building Trust," Electronic Markets: the International Journal of Electronic Commerce & Business Media, Vol. 12, No. 3, August 2002, pp. 157-162.
2002Tarasewich, Peter, Robert C. Nickerson, and Merrill Warkentin. "Issues in Mobile E-Commerce," Communications of the AIS, 2002, Volume 8, Article 3, pp. 41-64.
2002Tarasewich, Peter and Merrill Warkentin, "Information Everywhere," Information Systems Management, Winter 2002, Volume 19, Issue 1, pp. 8-13.
2002Shim, J. P., Merrill Warkentin, James F. Courtney, Daniel J. Power, Ramesh Sharda, and Christer Carlsson, "Past, Present, and Future of Decision Support Technology," Decision Support Systems , vol. 33(2), 2002, pp. 111-126.
2001Warkentin, Merrill, Vijayan Sugumaran, and Ravi Bapna. "eKnowledge Networks for Inter-Organizational Collaborative eBusiness", Logistics Information Management, (now renamed the Journal of Enterprise Information Management), Vol. 14, No. 1/2, March 2001, pp. 149-162.
2001Warkentin, Merrill. "Bricks to Clicks, and Back Again," Northeastern University Magazine, Volume 26, Number 4, March 2001, pp. 14-15.
2001Warkentin, Merrill, "The Next Big Thing in eCommerce," Decision Line, Volume 32(1), December / January 2001, pp. 7-10.
2000Warkentin, Merrill, Ravi Bapna, and Vijayan Sugumaran, "The Role of Mass Customization in Enhancing Supply Chain Relationships in B2C E-Commerce Markets," Journal of Electronic Commerce Research, Vol. 1, No. 2, 2000, pp. 45-52.
2000Tarasewich, Peter and Merrill Warkentin. "Issues in Wireless E-Commerce," ACM SIGEcom Exchanges, Issue 1.1, August 2000, pp. 19-25.
1999Warkentin, Merrill E. and Peggy Beranek, "Training to Improve Virtual Team Communication," Information Systems Journal, Vol. 9, No. 4, October/November 1999, pp. 271-289.
1999Warkentin, Merrill. "Protect Your Name! : Web Strategy Tip," Tech New England, 1999.
1997Warkentin, Merrill E., Lutfus Sayeed, and Ross Hightower. "Virtual teams versus Face-to-Face Teams: An Exploratory Study of a Web-based Conference System," Decision Sciences, Vol. 28, No. 4, Fall 1997, pp. 975-996.
1995Warkentin, Merrill E. "Building Virtual Teams with Computer-Mediated Communication Systems", The Real Times, Volume 35, Number 2, October 1996, pp. 2-3.
1995Warkentin, Merrill E. "Competitive Advantage on the World Wide Web: A Webmaster's Guide," ACM Applied Computing Review, Vol. 3, No. 2, Fall 1995, pp. 25-32.
1995Warkentin, Merrill E. "A Field Ecology of Expert System Shell Users," Journal of Intelligent Technologies, Vol. 8, No. 3, Winter 1995, pp. 95-103.
1995Warkentin, Merrill E. and Lutfus Sayeed. "Establishing a Web Site: Some Managerial Issues," ACM SIGICE Bulletin, Vol. 21, No. 2, October 1995, pp. 14-18.
1995Warkentin, Merrill E., Christopher K. Carlson, and Stephen R. Ruth. "A Low-Cost, High-Yield Intelligent Decision Support System for Navy Contract Termination Processing," ACM Applied Computing Review, Vol. 3, No. 1, Summer 1995, pp. 27-30.
1995Bonnici, Joseph and Merrill E. Warkentin. "Revisited: Fabbri and Mann's Criticism of the DPMA Model Curriculum," The Journal of Computer Information Systems, Vol. 35, No. 3, Spring 1995, pp. 96-98.
1994Warkentin, Merrill E., Kimberly Davis, Jay Liebowitz, and Janet Zeide, "AI in Business and Management: Law and Legal Applications," PC AI, Vol. 8, No. 6, pp. 23-26, Nov/Dec 1994.
1994Warkentin, Merrill E. and Saeed J. Roohani, "AI in Business and Management: Accounting and Auditing," PC AI, Vol. 8, No. 1, pp. 23-25, Jan/Feb 1994.
1994Warkentin, Merrill E. "Digital Multimedia's Synergistic Role in Knowledge Engineering: A Cross-Cultural Perspective," HEURISTICS: The Journal of Knowledge Engineering and Technology, Vol. 7, No. 2, Summer/Fall 1994, pp. 24-32.
1993Warkentin, Merrill E. and Paul Evans, "AI in Business and Management: Information Resource Management," PC AI, Vol. 7, No. 2, Mar/Apr 1993, pp. 35-37.
1993Schmuller, Joseph and Merrill Warkentin, "VP-Expert 3.0: A Fine Shell Improves with Age," PC AI, Vol. 7, No. 5, Sep/Oct 1993, pp. 33-37.
1993Warkentin, Merrill E., "AI in Business and Management: Customer Service," PC AI, Vol. 7, No. 6, Nov/Dec 1993, pp. 36-39.
1993Warkentin, Merrill E. "Verbal Domain Knowledge Acquisition: Unplugging the Bottleneck," HEURISTICS: The Journal of Knowledge Engineering and Technology, Vol. 6, No. 3, Fall 1993, pp. 21-26.
1992Warkentin, Merrill E. and Rodger Griffith, "AI in Business and Management: Human Resource Management," PC AI, Vol. 6, No. 4, Jul/Aug 1992, pp. 56-58.
1992Warkentin, Merrill E. and Gerald Hanweck, "AI in Business and Management: Finance," PC AI, Vol. 6, No. 3, May/Jun 1992, pp. 31-34.
1992Warkentin, Merrill E. and Sidhartha R. Das, "AI in Business and Management: Production and Operations Management," PC AI, Vol. 6, No. 2, Mar/Apr 1992, pp. 31-34.
1992Warkentin, Merrill E. and Rajendra S. Sisodia, "AI in Business and Management: Marketing," PC AI, Vol. 6, No. 1, Jan/Feb 1992, pp. 32-34.
1992Loch, Karen D., Houston H. Carr, and Merrill E. Warkentin. "Threats to Information Systems: Today's Reality, Yesterday's Understanding," MIS Quarterly, Vol. 16, No. 2, June 1992, pp. 173-186.
1991Das, Sidhartha R., Shaker A. Zahra, and Merrill E. Warkentin. "Integrating the Content and Process of Strategic MIS Planning with Competitive Strategy," Decision Sciences, Vol. 22, No. 5, Nov/Dec 1991, pp. 953-984.
1991Loch, Karen D., Houston H. Carr, and Merrill E. Warkentin. "Why Won't Organizations Tell You About Computer Crime?" Information Management Bulletin, Vol. 4, No. 1, February 1991.
1991Warkentin, Merrill E., "AI in Business and Management: An Overview," PC AI, Vol. 5, No. 6, Nov/Dec 1991, pp. 26-28.
1990Sprague, Kristopher G., Merrill E. Warkentin, Stephen R. Ruth, and P.K.R. Nair. "Cultivating a Prototyping Approach to Expert Systems Development," Expert Systems, Vol. 2, No. 3, Fall 1990, pp. 37-42.
1990Warkentin, Merrill E., Nair, P. K. R., Stephen R. Ruth, and Kristopher Sprague) "A Knowledge-Based Expert System for Planning and Design of Agroforestry Systems," Agroforestry Systems, Vol. 11, Issue 1, April 1990, pp. 71-83.
1989Armas, Sue, Octavio A. Armas, and Merrill E. Warkentin. "Expert Systems in Pathology and Medicine," Artificial Intelligence in Medicine, Vol. I, No. 2, June 1989, pp. 79-85.
1988Warkentin, Merrill E, "Expert System Shells," Decision Line, Vol. 19, No. 4, July 1988.
1987Warkentin, Merrill E, "The Third Era of Computing: Knowledge Processing, (Managers, Organizations Need to Process Knowledge Better)," Washington Technology, Vol. 2, No. 17, 1987, p. 8.
1985Bare, Charles L. and Merrill E. Warkentin, "Nebraska Economic Indexes," Business in Nebraska, Vol. 40, No. 489, June 1985.
1982Warkentin, Merrill E. and Paul W. Menter. "An Apple II Program for the Social Fabric Matrix and Boolean Digraphs," Journal of Economic Issues, Vol. XVI, No. 4, December 1982, pp. 1027-1037.



Books
YearDescription
 Books (see Book Chapters below)
2015Warkentin, Merrill (Ed.). Trends and Research in the Decision Analytics. Pearson/FT Press, 2015.
2014Warkentin, Merrill (Ed.). Trends and Research in the Decision Sciences. Pearson/FT Press, 2014 (ISBN 978-0133925371)
2010Sexton, Julie S., Brian M. McCann, and Merrill Warkentin. “Electronic Retailing,” an online tutorial hosted by The National e-Commerce Extension Initiative, US Department of Agriculture and the Southern Rural Development Center, 2010.
2006Warkentin, Merrill and Rayford B. Vaughn (Eds.). Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues, Hershey, PA: Idea Group Publishers, 2006. (ISBN 1-59140-911-X)
2002Warkentin, Merrill (Ed.), Business-to-Business Electronic Commerce: Challenges and Solutions, Hershey, PA: Idea Group Publishers, 2002. (ISBN 1-930708-09-2), 295 pages.
2002Efraim Turban, David King, Jae Lee, Merrill Warkentin, and H. Michael Chung. Electronic Commerce 2002: A Managerial Perspective, Upper Saddle River, NJ: Prentice-Hall, 2002. (ISBN 0-13-065301-2)
1991Warkentin, Merrill E. The TWIN Advanced Educational Edition, Allyn & Bacon Publishing, Inc., 1991. (ISBN 0-205-12426-7).
1986Kendall, Kenneth E., Merrill E. Warkentin, and Leon Cederlind. The Nebraska State Patrol Manpower Allocation Model: A Spatial Decision Support System for Traffic Enforcement, Nebraska State Patrol, July 1986.
1985Warkentin, Merrill E. (Ed.) Proceedings of the 3rd International Conference of the Systems Dynamics Society,, Keystone, Colorado, July 1985.
1983Lamphear, F. Charles, Raymond J. Supalla, Duane Jewell, Merrill E. Warkentin, Ron Konecny, and Cheryl Montgomery. The ADOTMATR Software Program for Developing and Applying Regional Input-Output Models for Economic Assessment Purposes, system documentation for software developed under contract from the National Oceanographic and Atmospheric Administration (NOAA), October 1983.
1983Warkentin, Merrill E. Fuel Ethanol Production in Nebraska: An Economic Impact Analysis, Nebraska Energy Office, September 1983. (Reprinted in U.S. Congress, House, Committee on Ways and Means, Subcommittee on Oversight, "Tax Incentives for the Production and Use of Ethanol Fuels," Ninety-eighth Congress, second session, July 9, 1984, pp. 148-242.)
 Book Chapters (see Books above)
2014Warkentin, Merrill. “Information systems security,” in Straub, Detmar and Richard Welke (Eds.), Wiley Encyclopedia of Management (3e), forthcoming, 2014.
2014Warkentin, Merrill and Leigh A. Mutchler. “Research in Behavioral Information Security Management,” (Article 54), in Information Systems and Information Technology, Volume 2 (Computing Handbook Set, Third Edition), edited by Heikki Topi and Allen Tucker. Boca Raton: Taylor and Francis, 2014, forthcoming.
2008Warkentin, Merrill and Allen C. Johnston. "IT Governance and Organizational Design for Security Management," in Information Security: Policies, Procedures, and Practices, Straub, Detmar M, Seymour Goodman and Richard L. Baskerville (Eds.), Armonk, NY: M.E. Sharpe, 2008, Chapter 3, pp. 46-68. (book TOC)
2008Xin Luo and Merrill Warkentin. "Malicious Code: Developments and Defenses," in Pagani, Margherita (Ed.), Encyclopedia of Multimedia Technology and Networking (2e), Hershey, PA: Idea Group Publishing, 2008.
2008Warkentin, Merrill, Kimberly Davis, and Ernst Bekkering. "Check-Off Password System (COPS): An Advancement in User Authentication Methods and Information Security," in Nemati, Hamid (Ed.), Information Security and Ethics: Concepts, Methodologies, Tools, and Applications, Hershey, PA: Information Science Reference, 2008, Chapter 1.30, pp. 402-418.
2008Warkentin, Merrill, Mark B. Schmidt, and Ernst Bekkering. "Steganography," Chapter VII in Colarik, Andrew M. and Lech Janczewski (Eds.), Cyber Warfare and Cyber Terrorism, 2008.
2008Warkentin, Merrill and Allen C. Johnston. "IT Security Governance and Centralized Security Controls," in Nemati, Hamid (Ed.), Information Security and Ethics: Concepts, Methodologies, Tools, and Applications, Hershey, PA: Information Science Reference, 2008, Chapter 4.32, pp. 2130-2138.
2008Warkentin, Merrill, Kimberly Davis, and Ernst Bekkering. "A TAM Analysis of an Alternative High-Security User Authentication Procedure," in Nemati, Hamid (Ed.), Information Security and Ethics: Concepts, Methodologies, Tools, and Applications, Hershey, PA: Information Science Reference, 2008, Chapter 4.31, pp. 2114-2129.
2007Warkentin, Merrill; Mark B. Schmidt, and Ernst Bekkering."Steganography and Steganalysis," in Sasaki, Hidevasu (Ed.), Intellectual Property Protection for Multimedia Information Technology, IGI Global, Chapter XIX, pp. 374-380, 2007.
2007Hightower, Ross, Lutfus Sayeed, and Merrill Warkentin, "A Longitudinal Study of Information Exchange in Computer-Mediated and Face-to-Face Groups" in Kulkarni, Uday; Daniel J. Power; and Ramesh Sharda (Editors), Decision Support for Global Enterprises, Annals of Information Systems, Volume 2, Springer-Verlag Publishers, 2007, pp. 93-112.
2007Warkentin, Merrill and April M. Adams. "A Framework for Evaluating Outsourcing Risk," Chapter 13 in Schniederjans, Mark; Ashlyn M. Schniederjans; and Dara G. Schniederjans (Eds.), Outsourcing Management Information Systems, Hershey, PA: Idea Group Publishing, 2007, pp. 268-279.
2007Luo, Xin and Merrill Warkentin. "Consumers' Preferences and Attitudes toward Mobile Office Use: A Technology Trade-off Research Agenda," Chapter IX in Sounderpandian, Jayavel and Tapan Sinha (Eds), E-Business Process Management: Technologies and Solutions, pp. 176-185, Hershey, PA: Idea Group Publishing, 2007 (reprinted in Lee, In (Ed.). Electronic Business: Concepts, Methodologies, Tools, and Applications, pp. 1920-1928, Chapter 6.13, Hershey, PA: Information Science Reference, 2009).
2006Warkentin, Merrill and Allen C. Johnston. "IT Security Governance and Centralized Security Controls," Chapter II, pp. 16-24 in Warkentin, Merrill and Rayford Vaughn (Eds.), Enterprise Information Assurance and System Security: Managerial and Technical Issues, Hershey, PA: Idea Group Publishing, 2006.
2006Warkentin, Merrill, Mark B. Schmidt, and Ernst Bekkering. "Steganography and Steganalysis," Chapter XVII, pp. 287-295, in Warkentin, Merrill and Rayford Vaughn (Eds.),Enterprise Information Assurance and System Security: Managerial and Technical Issues, Hershey, PA: Idea Group Publishing, 2006.
2006Moore, Robert S., Merrill Warkentin, and Melissa Moore. "Information Integration for Relationship Management," in Khosrow-Pour, Mehdi (Ed.), Encyclopedia of E-Commerce, E-Government, and Mobile Commerce, Hershey, PA: Idea Group Reference, 2006, pp. 608-614.
2006Gefen, David, Gregory M. Rose, Merrill Warkentin, and Paul A. Pavlou, "Culture and Trust in Electronic Voting: A Look at the USA and South Africa," in Hunter, Gordon and Felix Tan (Eds.), Advanced Topics in Global Information Management, Vol. 5, Hershey, PA: Idea Group Inc., 2006, Chapter V, pp. 102-127.
2006Lee, Cheon-Pyo and Merrill Warkentin. "Mobile Banking Systems and Technology," in Khousrow-Pour, Mehdi (Ed.), Encyclopedia of E-Commerce, E-Government and Mobile Commerce, Hershey, PA: Idea Group Reference, 2006, pp. 754-759.
2005Warkentin, Merrill, Kimberly Davis, and Ernst Bekkering. "A TAM Analysis of an Alternative High-Security User-Authentication Procedure," Chapter 14 (pp. 280-300) in Mahmood, M. Adam (Ed.), Advanced Topics in Organizational and End User Computing, Volume IV, Hershey, PA: IRM Press, 2005.
2005Warkentin, Merrill, Robert C. Moore, and Melissa Moore. "A Synthesis and Analysis of Behavioral and Policy Issues in Electronic Marketing Communication," Chapter 5 (pp. 105-117) in Krishnamurthy, Sandeep (Ed.), Contemporary Research in E-Marketing: Volume Two , Idea Group Publishing, 2005.
2005Xin Luo and Merrill Warkentin, "Malware and Anti-Virus Procedures," in Pagani, Margherita (Ed.), Encyclopedia of Multimedia Technology and Networking, Idea Group Publishing, 2005.
2004Lueg, Jason E., Robert S. Moore, and Merrill Warkentin, "Motivation and Search Intensity: An Investigation of Online Consumer Search Behavior," Chapter VII, (pp. 127-142) in Mahmood, M. Adam (Ed.), Advanced Topics in End User Computing, Volume III, Hershey, PA: IRM Press, 2004.
2003Warkentin, Merrill and Akhilesh Bajaj. "Continuous Demand Chain Management: A Downstream Business Model for E-Commerce," Chapter XIII (pp. 163-182) in Mariga, Julie (Ed). Managing E-Commerce and Mobile Computing Technologies. Hershey, PA: IRM Press, 2003. ISBN 1-931777-46-2
2002Warkentin, Merrill and Akhilesh Bajaj. "The On-Demand Delivery Services Model for eCommerce," Chapter 8 (pp. 130-148) in Gangopadhyay, Aryya (Ed.), Managing Business with Electronic Commerce: Issues and Trends, Hershey, PA: Idea Group Publishers, 2002.
2002Warkentin, Merrill. "Dynamic Digital Process Integration in Business-to-Business Networks," Chapter 13 (pp. 261-281) in Warkentin, Merrill (Ed.). Business-to-Business Electronic Commerce: Challenges and Solutions, Hershey, PA: Idea Group Publishers, 2002.
2001Warkentin, Merrill, Ravi Bapna, and Vijayan Sugumaran, "Intelligent Agents for Electronic Commerce: Trends and Future Impact on Business Models and Markets," Chapter 7 (pp. 101-120) in Rahman, Syed Mahbubur and Robert J. Bignall (Eds.), Internet Commerce and Software Agents: Cases, Technologies and Opportunities, Hershey, PA: Idea Group Publishers, 2001. ISBN 1-930708-01-7.
1999Warkentin, Merrill, Lutfus Sayeed, and Ross Hightower. "Virtual teams versus Face-to-Face Teams: An Exploratory Study of a Web-based Conference System," Chapter 10 (pp. 241-262) in Kendall, Kenneth E. (Ed.), Emerging Information Technologies, Thousand Oaks, CA: SAGE Publications, Inc, 1999. (ISBN:0-7619-1748-9 hardcover, ISBN 0-7619-1749-7 paperback)
1997Hightower, Ross T., Lutfus Sayeed, Merrill E. Warkentin, and Roger McHaney, "Information Exchange in Virtual Work Groups," Chapter 11 (pp. 199-216) in Igbaria, Magid and Margaret Tan (eds.), The Virtual Workplace, Hershey, PA: Idea Group Publishers, 1997. ISBN 1-878289-41-1.
1995Warkentin, Merrill E. "Information System Security and Privacy," Chapter 4 (pp. 57-77) in Emerging Information Technologies, Advances in Telematics, Volume 3, Jarice Hanson, series editor, Norwood, NJ: Ablex Publishing, 1995 (Jay Liebowitz, volume coordinator). ISBN 1-56750-118-4.
1991Rafea, Ahmed A., Merrill E. Warkentin, and Stephen R. Ruth, "Knowledge Engineering: Creating Expert Systems for Crop Production Management in Egypt," Chapter 7 (pp. 89-104) in Expert Systems in Developing Countries: Practice and Promise, Stephen R. Ruth and Chip Mann (eds.), Boulder, CO: Westview Press, 1991. ISBN0-8133-8397-8.
1991Warkentin, Merrill E., P.K.R. Nair, Stephen R. Ruth, and Kristopher Sprague, "A Knowledge-Based Expert System for Planning and Design of Agroforestry Systems," Chapter 8 (pp. 105-114) in Expert Systems in Developing Countries: Practice and Promise, Stephen R. Ruth and Chip Mann (eds.), Boulder, CO: Westview Press, 1991. ISBN 0-8133-8397-8.
1989Carlson, Christopher K., Stephen R. Ruth, Merrill E. Warkentin, and Jerry Zamer, "A Contract Termination Processing Model for Naval Supply Demand Review (SDR) Actions," in Cost Analysis Applications of Economics and Operations Research, T.R. Gulledge, Jr. and L.A. Litteral (Eds.), New York: Springer-Verlag, 1989, pp. 34-44. ISBN 0-387-97048-7.



Presentations, Proceedings, and Other Publications
YearDescription
2014Note: This list shows only presentations/proceedings at academic conferences. Dr. Warkentin has also been a visiting professor, guest lecturer, or invited speaker at over 50 universities and at over one hundred other locations (industry groups, companies, clubs, organizations, meetings, conferences, workshops, seminars, and trade associations). He was formerly named a "Distinguished Lecturer" by the Association for Computing Machinery (ACM), the oldest and largest IT professional organization in the US and the world. Some of the universities at which he has spoken or served as a visiting professor include Georgia State University, Louisiana State University, Florida State University, Indiana University, Clemson University, the University of South Florida, Florida Atlantic University, University of New Mexico, SUNY-Binghamton, SUNY-Albany, University of Central Florida, Copenhagen Business School, McMaster University, and the University of Oulu (Finland).
2014Warkentin, Merrill. "Information systems security," in Straub, Detmar and Richard Welke, Wiley Encyclopedia of Management (3e), 2014.
2014Warkentin, Merrill and Leigh Mutchler. "Research in Behavioral Information Security Management," (Article 54), in Information Systems and Information Technology, Volume 2 (Computing Handbook Set, Third Edition), edited by Heikki Topi and Allen Tucker. Boca Raton: Taylor and Francis, 2014.
2013Lee Jr., James, Robert E. Crossler, and Merrill Warkentin. “Implications of Monitoring Mechanisms on Bring Your Own Device (BYOD) Adoption,” Proceedings of the 2013 International Conference on Information Systems (ICIS), Milan, Italy, December 2013.
2013Stephane Collignon, Tabitha James, Merrill Warkentin, and Byung C. Kim. “Developing scales to measure constructs for a privacy calculus and information privacy behaviors specific to social computing technologies” Proceedings of 2013 IFIP 8.11/11.13 Dewald Roode Information Security Research Workshop, Niagara, NY, October 2013.
2013Warkentin, Merrill, Zhengchuan Xu, and Leigh A. Mutchler. “I’m Safer than You: The Role of Optimism Bias in Personal IT Risk Assessments,” Proceedings of 2013 IFIP 8.11/11.13 Dewald Roode Information Security Research Workshop, Niagara, NY, October 2013.
2013Warkentin, Merrill, Sanjay Goel, and Philip Menard. "Consumer Acceptance of Smart Metering Technology,"Proceedings of the Annual Symposium on Information Assurance, Albany, NY, June 2013.
2013Stephane Collignon, Tabitha James, Merrill Warkentin, and Byung C. Kim. "What Drives Perceptions of Threats to Your Facebook Friends' Information?" Proceedings of the Annual Symposium on Information Assurance, Albany, NY, June 2013.
2012Warkentin, Merrill, Nirmalee Malimage, and Kalana Malimage. "Impact of Protection Motivation and Deterrence on IS Security Policy Compliance: A Multi-Cultural View," Proceedings of the Workshop on Information Security and Privacy (WISP), 2012, Orlando.
2012Warkentin, Merrill; Maranda McBride, Lemuria Carter, and Allen C. Johnston. "Individualized Security Training System," Proceedings of the National Decision Sciences Institute (DSI) Annual Conference, November 2012, San Francisco.
2012Warkentin, Merrill, Nirmalee Malimage, and Kalana Malimage. "Impact of Protection Motivation and Deterrence on IS Security Policy Compliance: A Multi-Cultural View," Proceedings of the Workshop on Information Security and Privacy (WISP), 2012, Orlando.
2012Sharma, Shwadhin and Merrill Warkentin. "Impact of Employment Status on Information Security Policy Compliance," Proceedings of the National Decision Sciences Institute (DSI) Annual Conference, San Francisco, November 2012.
2012Ormond, Dustin and Merrill Warkentin. "Message Quality and Quantity Manipulations and their Effects on Perceived Risk," Proceedings of the National Decision Sciences Institute (DSI) Annual Conference, San Francisco, November 2012.
2012Warkentin, Merrill, Nirmalee Malimage, and Kalana Malimage. "Impact of Protection Motivation and Deterrence on IS Security Policy Compliance: A Multi-Cultural View," Proceedings of the Workshop on Information Security and Privacy (WISP), 2012, Orlando.
2012McBride, Maranda, Lemuria Carter, and Merrill Warkentin. "Exploring the Role of Individual Employee Characteristics and Personality on Employee Compliance with Cybersecurity Policies," Institute for Homeland Security Systems, white paper, 2012.
2012McBride, Maranda, Lemuria Carter, and Merrill Warkentin. "One Size Doesn't Fit All: Cyber Security Training Should be Customized," Institute for Homeland Security Systems, white paper, 2012.
2012McBride, Maranda, Lemuria Carter, and Merrill Warkentin. "The Role of Situational Factors and Personality on Employee Cybersecurity Policy Violation," Institute for Homeland Security Systems, white paper, September 2012.
2012Warkentin, Merrill; Maranda McBride, Lemuria Carter, and Allen C. Johnston. "Individualized Security Training System," Proceedings of the National Decision Sciences Institute (DSI) Annual Conference, November 2012, San Francisco.
2012Sharma, Shwadhin and Merrill Warkentin. "Impact of Employment Status on Information Security Policy Compliance," Proceedings of the National Decision Sciences Institute (DSI) Annual Conference, San Francisco, November 2012.
2012Ormond, Dustin and Merrill Warkentin. "Message Quality and Quantity Manipulations and their Effects on Perceived Risk," Proceedings of the National Decision Sciences Institute (DSI) Annual Conference, San Francisco, November 2012.
2012"Challenges and Opportunities for Publishing Information Security Research," at 2012 International Federation of Information Processing (IFIP) 8.11/11.13 Dewald Roode Workshop on Information Systems Security Research, Provo, Utah, September 2012 (with co-panelists Richard Baskerville and France Belanger).
2012Warkentin, Merrill, Shwadhin Sharma, David Gefen, Paul A. Pavlou, and Gregory M. Rose. "Government of the People, By the People, For the People: A Look at Trust in eGovernment," Proceedings of the Eighteenth Americas Conference on Information Systems, Seattle, WA, 2012.
2012Warkentin, Merrill and Nirmalee Malimage. "Overcoming Mixed-Gender Requirements Misspecification with the Modified Coherence Method," Proceedings of the Eighteenth Americas Conference on Information Systems, Seattle, WA, 2012.
2012Warkentin, Merrill, Maranda McBride, Lemuria Carter, and Allen C. Johnston. "Exploring the Role of Individual Employee Characteristics and Personality on Employee Compliance with Cybersecurity Policies," Proceedings of the Eighteenth Americas Conference on Information Systems, Seattle, WA, 2012.
2012Sharma, Shwadhin and Merrill Warkentin, "Impact of Employment Status on Information Security Policy Compliance," Proceedings of the National Decision Sciences Institute (DSI) Annual Conference, 2012, San Francisco.
2012 
2012Warkentin, Merrill, Eric A. Walden, Allen C. Johnston, and Detmar W. Straub. "Identifying the Neural Correlates of Protection Motivation for Secure IT Behaviors," Gmunden Retreat on NeuroIS 2012, Gmunden, Austria, 2012.
2012Warkentin, Merrill, Detmar Straub, and Kalana Malimage. "Measuring Secure Behavior: A Research Commentary," Proceedings of the Annual Symposium on Information Assurance, pp. 1-8, Albany, New York, June 5-6, 2012.
2011Vance, Anthony, Mikko Siponen, and Merrill Warkentin. "Deterrence Without Borders: How National Culture Affects IS Security Policy Violations," Proceedings of the 2011 Workshop on Information Security and Privacy (WISP), pre-ICIS, Shanghai, China, Dec. 3, 2011.
2011Warkentin, Merrill, Detmar Straub, and Kalana Malimage. "Measuring the Dependent Variable for Research into Secure Behaviors," Decision Sciences Institute Annual National Conference, Boston, Nov. 19, 2011.
2011Warkentin, Merrill, Maranda McBride, and Lemuria Carter. "The Impact of Personality and Other Individual Characteristics on Security Policy Compliance," Decision Sciences Institute Annual National Conference, Boston, Nov. 21, 2011.
2011"Why Do Employees Commit Computer Abuse?: Deterrence and Rationalizing Violations of Information Security Policies in Organizations," Indiana University, October 7, 2011
2011"Why Do Some Users Stop Scanning? An Empirical Study of Secure Behavior Discontinuance," James Madison University, September 28, 2011.
2011"The Role of Perceptions of Organizational Injustice and Techniques of Neutralization in Forming Computer Abuse Intentions," McMaster University (Hamilton, Ontario), Aug. 2, 2011.
2011"Persuasive Communication Strategies: Assessing the Fit Between Fear Appeals and Organizational Identification," Louisiana State University (LSU), February 18, 2011.
2011Warkentin, Merrill, Robert Willison, and Allen C. Johnston. "The Role of Perceptions of Organizational Injustice and Techniques of Neutralization: in Forming Computer Abuse Intentions," Proceedings of the 17th Americas Conference on Information Systems (AMCIS), Detroit, August 2011, pp. 1-8.
2010Malimage, Kalana and Merrill Warkentin. "Data Loss from Storage Device Failure: An Empirical Study of Protection Motivation," 2010 Workshop on Information Security and Privacy (WISP), pre-ICIS, Dec. 12, 2010.
2010Das, Debjani and Merrill Warkentin, "Are clickers overrated? A study of the salient components contributing to CRS success and failure", INFORMS Southern Regional Conference, Huntsville, AL, April 2010.
2010'Behavioral Research Projects in Information Systems Security,' Florida State University, March 15, 2010.
2009Pope, Michael Brian, Merrill Warkentin, Leigh A. Mutchler, and Xin Luo. "The Domain Name System: Past, Present, and Future," Proceedings of the National Decision Sciences Institute (DSI) Annual Conference, New Orleans, November 2009, pp. 2211-2216. (Named one of three MIS "Distinguished Track" Papers.)
2009Luo, Xin, Merrill Warkentin, and Allen C. Johnston. "The Impact of National Culture on Workplace Privacy Expectations in the Context of Information Security Assurance," Proceedings of the 2009 Americas Conference on Information Systems (AMCIS), San Francisco, CA, August 2009.
2009Willison, Robert and Merrill Warkentin. "Motivations for Employee Computer Crime: Understanding and Addressing Workplace Disgruntlement through the Application of Organisational Justice." Proceedings of the International Federation of Information Processing (IFIP) International Workshop on Information Systems Security Research, pp. 127-144, Cape Town, South Africa, May 2009.
2009Johnston, Allen C., Merrill Warkentin, and Xin Luo. "National Culture and Information Privacy: The Influential Effects of Individualism and Collectivism on Privacy Concerns and Organizational Commitment," Proceedings of the International Federation of Information Processing (IFIP) International Workshop on Information Systems Security Research, pp. 88-104, Cape Town, South Africa, May 2009.
2009Warkentin, Merrill. "Foreward" to book: Knapp, Kenneth J. (Ed.) Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions, Information Science Reference, 2009.
2008French, Aaron M. and Merrill Warkentin. "Online Social Networks: Why Privacy is a Thing of the Past," Proceedings of the National Decision Sciences Institute (DSI) Annual Conference, pp. 4571-4576, Baltimore, MD, November 2008.
2008Lee, Cheon-Pyo, Xin Luo, and Merrill Warkentin. "Perceptions of Security and Privacy When Using Mobile Communication Systems," Proceedings of the 2008 Annual National Conference of the Decision Sciences Institute (DSI), pp. 4281-4286, Baltimore, MD, November 2008.
2007Warkentin, Merrill, Aaron M. French, and Chengqi Guo. "Investigating the Antecedents of E-Commerce Non-Adoption and Rejection: An Empirical Analysis," Proceedings of the National Decision Sciences Institute (DSI) Annual Conference, pp. 2931-2936, Phoenix, AZ, November 2007.
2007Yu, Jongtae and Merrill Warkentin. "A Framework for System Development Outsourcing Management," Decision Sciences Institute Annual Conference, Phoenix, AZ, November 2007.
2007Warkentin, Merrill, Robert Moore, Ernst Bekkering, and Allen C. Johnston. "Systems Development Project Risk Perceptions," Proceedings of the National Decision Sciences Institute (DSI) Annual Conference, Phoenix, AZ, pp. 2911-2916, November 2007.
2007Warkentin, Merrill, Ernst Bekkering, Allen C. Johnston, and Robert Moore. "Risk Perspectives in Systems Development," Proceedings of the 2007 Americas Conference on Information Systems (AMCIS), Keystone, CO.
2007Warkentin, Merrill, Changqi Guo, Xin Luo, and Feifei Xie. "An Assessment of U.S. and Chinese Online Gaming Environments and Futures," Proceedings of the 2007 Americas Conference on Information Systems (AMCIS), Keystone, CO.
2007Warkentin, Merrill, Jordan Shropshire, and Allen C. Johnston. "The IT Security Adoption Conundrum: An Initial Step Toward Validation of Applicable Measures, Proceedings of the 2007 Americas Conference on Information Systems (AMCIS), Keystone, CO.
2006Warkentin, Merrill, Jordan Shropshire, and Allen C. Johnston. "Security Software Discontinuance," Proceedings of the 2006 Workshop on Information Security and Assurance (WISA), the SIGSEC pre-ICIS Workshop, Milwaukee, WI, Dec. 10, 2006.
2006Warkentin, Merrill, Aaron French, and Chengqi Guo. "An Empirical Analysis of Antecedents of E-Commerce Non-Adoption and Rejection," Proceedings of the Fifth Workshop on eBusiness (WEB2006), (pre-ICIS), Milwaukee, WI, Dec. 9, 2006.
2006Shropshire, Jordan, Merrill Warkentin, Allen C. Johnston, and Mark B. Schmidt. "Personality and IT security: An application of the five-factor model," Proceedings of the 2006 Americas Conference on Information Systems (AMCIS), pp. 3443 - 3449.
2006Warkentin, Merrill, Allen C. Johnston, and April M. Adams. "User Interaction with Healthcare Information Systems: Do Healthcare Professionals Want to Comply with HIPAA? ," Proceedings of the 2006 Americas Conference on Information Systems (AMCIS)
2006Warkentin, Merrill. "Behavioral Research in Business Research (with a special focus on Information Assurance," Research Forum keynote address, St. Cloud State University, St. Cloud, Minnesota, July 21, 2006.
2006Warkentin, Merrill and Allen C. Johnston. "Privacy Policy Compliance: What Motivates Employees?" presented at the Third Annual Forum on Financial Information Systems and Cybersecurity: A Public Policy Perspective," College Park, Maryland (USA), May 24, 2006.
2006Warkentin, Merrill, Jordan Shropshire, and Allen C. Johnston. "Why Do We "Check the Box"? - A Study of Security Action Automation and Capitulation," Proceedings of The ISOneWorld Security Conference, Las Vegas, NV, April 2006.
2005Luo, Xin and Merrill Warkentin, "Consumers" Preferences, Attitudes, and Trade-offs towards Mobile Office Use: A Conjoint Analysis", Proceedings of 2005 Decision Science Institute (DSI) Annual National Meeting , pp. 13961-13966, San Francisco, November 2005.
2005Lee, Cheon-Pyo and Merrill Warkentin, "A Conceptual Framework for Diffusion of Emerging Electronic Media within Organizations," Proceedings of the 2005 Decision Science Institute (DSI) Annual National Meeting , pp. 13221-13226, San Francisco, November 2005.
2005Campbell, Natalie and Merrill Warkentin, "External Funding in IS Research," presented at the Annual National Meeting of the Institute for Operations Research and the Management Sciences (INFORMS), San Francisco, Nov. 16, 2005.
2005Lee, Cheon-Pyo and Merrill Warkentin, "The Role of Technology Anxiety and Self-Efficacy in Information Technology Training," Proceedings of the Eleventh Americas Conference on Information Systems (AMCIS) , Omaha, NE, August 2005.
2005Luo, Xin, Cheon-Pyo Lee, and Merrill Warkentin. "Adoption of Instant Messaging in an Information Security Supervision and Management Environment: An Empirical Study in Workplace Adoption," Proceedings of the 2005 Annual International Conference of the Information Resources Management Association (IRMA), pp. 856-858, San Diego, CA, May 2005.
2005Lee, Cheon-Pyo, Xin Luo, and Merrill Warkentin. "Perceptions of Security and Privacy when using E-mail and IM: An Analysis of Administrative and Line Staff Congruence," Proceedings of the 2005 International Conference of Enterprise Information Systems (ICEIS), Miami, FL, May 2005, accepted but withdrawn.
2005Warkentin, Merrill. "IT Governance and Organizational Development for Security Management," presentation to CS6725 - Information Security Policies and Strategies - graduate seminar course at Georgia Tech University (Seymour Goodman, Professor), February 8, 2005.
2005Warkentin, Merrill. "Grand Challenges of IS Research," panelist, ISOneWorld conference, Kevin C. Desouza, panel chair, March 2005.
2004Bekkering, Ernst, Mark B. Schmidt, Allen Johnston, Merrill Warkentin, and Phillip Nelson, "Empirical Investigation of Attractivenes of Tablet PCs to Mobile Professionals," Proceedings of the National Decision Sciences Institute (DSI) Annual Conference, pp. 3481-3486, Boston, MA, November 2004.
2004Warkentin, Merrill and Xin Luo, "Perceptions of Wi-Fi Security Requirements: A Stratified View," 2004 Decision Science Institute (DSI) Annual Meeting, Boston, MA, November 2004.
2004Warkentin, Merrill. "Threats to your IS Security" presentation to the national conference of the Association of Information Technology Professionals (AITP), Jackson, MS, September 21, 2004.
2004Lee, Cheon-Pyo, Merrill Warkentin, and Haiwook Choi. "The Role of Technological and Social Factors on the Adoption of Mobile Payment Technologies," Proceedings of the Tenth Americas Conference on Information Systems, New York, NY, August 2004.
2004Vaughn, Rayford B., David A. Dampier, and Merrill Warkentin. “Building an Information Security Education Program,” Proceedings of the 2004 Information Security Curriculum Development Conference (InfoSecCD 2004), Kennesaw, GA, September 2004.
2004Warkentin, Merrill, Ernst Bekkering, Mark B. Schmidt, and Allen C. Johnston. "Proposed Study of End-User Perceptions Regarding Tablet PCs," Proceedings of the 2004 Information Resources Management Association (IRMA). May 2004, New Orleans, LA.
2004Warkentin, Merrill, Mark B. Schmidt, Allen C. Johnston, and Matthew Boren. "IS Security Management Framework: A Comprehensive Life Cycle Perspective," Proceedings of the 2004 Information Resources Management Association (IRMA). May 2004, New Orleans, LA.
2004Schmidt, Mark B., Ernst Bekkering, and Merrill Warkentin. "On the Illicit Use of Steganography and Its Detection," Proceedings of the 2004 ISOneWorld International Conference, April 2004, Las Vegas, NV.
2004Xin Luo and Merrill Warkentin. "Assessment of Information Security Spending and Costs of Failure," Proceedings of the 2004 ISOneWorld International Conference, April 2004, Las Vegas, NV.
2004Johnston, Allen C. and Merrill Warkentin. "The Consumer Online Trust Construct: A Web Merchant Practitioner Perspective," Proceedings of the 2004 Southern Association of Information Systems (SAIS), Savannah, GA: February 2004.
2003Rose, Gregory M., Merrill Warkentin, David Gefen, and Paul A. Pavlou. "The Role and System Characteristics of Internet-Voting in a Multi-cultural, Nascent Democracy", Proceedings of the 11th Annual Cross-Cultural Meeting in Information Systems, (ICIS mini-conference), Seattle, WA, December 2003.
2003Warkentin, Merrill, Ernst Bekkering, and Kimberly Davis, "An Alternative Password Procedure: An Application of TAM," Proceedings of the 2003 National Decision Sciences Institute (DSI) Conference, 6 pages, November 2003.
2003Bekkering, Ernst, Merrill Warkentin, and Kimberly Davis, "A Longitudinal Comparison of Four Password Procedures," Proceedings of the 2003 Hawaii International Conference on Business, 13 pages, June 2003.
2003Bekkering, Ernst, Merrill Warkentin, and Kimberly Davis, "Towards Powerful, User-Friendly Authentication: The Check-off Password System ("COPS")," Proceedings of the 2003 Annual International Conference of the Information Resources Management Association (IRMA), pp. 706-708, May 2003.
2003Johnston, Allen C. and Merrill Warkentin, "An XML-based Security Protocol for Semi-Autonomous Agents," Proceedings of the 2003 Annual International Conference of the Information Resources Management Association (IRMA), pp. 674-675.
2003"Information Security in the era of terrorist attacks," Panel Discussant at 2003 Information Resources Management Association (IRMA) International Conference, May 2003.
2003Warkentin, Merrill and Mark B. Schmidt. "Evaluating Executive Perceptions of IS Security Threats and Responses: A Post 9/11 Critique," Proceedings of the 2003 IS OneWorld International Conference.
2002Gefen, David, Merrill Warkentin, Paul A. Pavlou, and Gregory M. Rose. "E-Government Adoption," Proceedings of the AIS 2002 Americas Conference on Information Systems (AMCIS), pp. 569-576, Dallas, TX, August 2002.
2001Hightower, Ross, Lutfus Sayeed, and Merrill Warkentin. "A Longitudinal Study of Information Exchange in Computer-Mediated and Face-to-Face Groups," Proceedings of the 2001 Annual Conference of the Western Decision Sciences Institute, pp. 548-550. (Winner of the "Best Paper Award" in MIS category.)
2001Tarasewich, Peter, Robert C. Nickerson, and Merrill Warkentin. "Wireless/Mobile E-commerce: Technologies, Applications, and Issues," Proceedings of the 2001 AIS Americas Conference on Information Systems (AMCIS), pp. 435-438, August 2001.
2001Davis, Kimberly and Merrill Warkentin, "Strategic and Legal Issues in Internet Branding: Selection and Protection of Internet Domain Names," Proceedings of the 2001 National Conference of the Decision Sciences Institute, pp. 246-248, November 2001.
2000Warkentin, Merrill, Ravi Bapna and Vijayan Sugumaran. "Intelligent Decision Support for eCommerce," Proceedings of the 2000 Annual National Conference of the Decision Sciences Institute, p. 657.
2000Warkentin, Merrill and Ravi Bapna. "Intelligent Agent-Based Data Mining in Electronic Markets," Proceedings of the 2000 Annual Americas Conference on Information Systems (AMCIS), pp. 311-313.
2000Warkentin, Merrill and Akhilesh Bajaj. "An Investigation into Online Grocer Selection Criteria," Proceedings of the 2000 Annual Northeast Conference of the Decision Sciences Institute, pp.155-157.
1999Warkentin, Merrill, Lutfus Sayeed, and Ross Hightower. "An Exploration of a World Wide Web-based Conference System for Supporting Virtual Teams Engaged in Asynchronous Collaborative Tasks," Proceedings of the 1999 Annual International Conference of the Decision Sciences Institute, pp. 864-866.
1999Warkentin, Merrill and Vijayan Sugumaran. "Role of Intelligent Software Agents in Electronic Commerce," Proceedings of the 1999 Annual Northeast Conference of the Decision Sciences Institute, pp.143-145.
1999Warkentin, Merrill, Lutfus Sayeed and Ross Hightower. "Information Exchange Effectiveness in CMCS Groups: A Longitudinal Study," Proceedings of the 1999 Annual National Conference of the Decision Sciences Institute, pp 598-600.
1999Warkentin, Merrill and Yang Lee. "The Impact of Information Quality on Perceptions and Outcomes of Computer-Mediated Communication," Proceedings of the 1999 Annual Conference of the Association for Information Systems (AIS), pp. 367-368.
1998Warkentin, Merrill, Lutfus Sayeed and Ross Hightower. "A Comparison of Information Exchange in Computer Mediated Remote and GPSS Groups," Proceedings of the 1998 Annual National Conference of the Decision Sciences Institute, pp 598-600.
1998Warkentin, Merrill, Lutfus Sayeed and Ross Hightower. "Identifying Pedagogical Strategies for Teaching Virtual Team Skills," Proceedings of the 1998 International Conference of the Information Resources Management Association (IRMA).
1996Warkentin, Merrill and Lutfus Sayeed. "An Empirical Investigation of Implementation Factors for IT Tools in U.S. Courts," Proceedings of the 1996 Annual National Conference of the Decision Sciences Institute, p. 638.
1996Warkentin, Merrill and Lutfus Sayeed. "Web-Based Virtual Classroom Discussions and Remote Collaboration," Proceedings of the 1996 Annual Conference of the Association for Information Systems, pp. 893-895.
1996Warkentin, Merrill. "Design Guidelines for Achieving Synergy between Digital Multimedia and Artificial Intelligence," Educational Multimedia and Hypermedia, 1996 Proceedings of ED-MEDIA 96 - World Conference on Educational Multimedia and Hypermedia), Association for the Advancement of Computing in Education (AACE), p. 816.
1995Warkentin, Merrill and Lutfus Sayeed. "Policies And Standards For Digital Commerce On The World Wide Web," Proceedings of the 1995 Annual National Conference of the Decision Sciences Institute, pp. 721-723.
1995Warkentin, Merrill. "Emerging Information Technologies for Knowledge Acquisition: A Critical Evaluation," Proceedings of the 1995 Annual National Conference of the Decision Sciences Institute, pp. 573-575.
1995Warkentin, Merrill. "Digital Multimedia Interfaces: Improving the Accessibility of Decision Support Technology," Proceedings of the 1995 Conference of the Northeast Decision Sciences Institute, pp. 215-217 (nominated for the Robert W. Pearson Best Paper Award).
1994Warkentin, Merrill, Janice C. Sipior, and Barin Nag. "Assertors and Facilitators: A New Communication Paradigm for Knowledge Acquisition," Proceedings of the 1994 Annual National Conference of the Decision Sciences Institute, pp. 787-789.
1994Warkentin, Merrill E. "Intelligent System Validation and the Loebner Prize Competition," Proceedings of the 1994 Conference of the Northeast Decision Sciences Institute, pp. 206-208.
1994Warkentin, Merrill and Johan P. du Plessis. "Can the Turing Test Provide a Realistic Framework for AI Testing?" Proceedings of the Second World Congress on Expert Systems, pp. 405-410, January 1994.
1993Motiwalla, Luvai, James Fairfield-Sonn, Merrill E. Warkentin, and Douglas McQuilkin. "Measuring Overall Returns on Investment for Expert Systems," Proceedings of the 1993 Conference of the Northeast Decision Sciences Institute
1992Warkentin, Merrill E. and Stephen R. Ruth. "Expert System Shell Use: Preliminary Findings of a Major Study," Proceedings of the 1992 Conference of the Northeast Decision Sciences Institute, pp. 167-169.
1991Rafea, Ahmed A., Merrill E. Warkentin, and Stephen R. Ruth. "An Expert System for Cucumber Production in Plastic Tunnels," Proceedings of the First World Congress on Expert Systems, December 1991, pp. 909-916.
1991Nair, P.K.R., Merrill E. Warkentin, and Stephen R. Ruth. "An Expert System for Tropical and Subtropical Agricultural Management," Proceedings of the First World Congress on Expert Systems, December 1991, pp. 929-936.
1991"Marketing and Expert Systems: Review, Synthesis, and Agenda," Proceedings of the First World Congress on Expert Systems, December 1991, pp. 274-281 (with Rajendra S. Sisodia).
1991Warkentin, Merrill E. "Microcomputer-based Knowledge Engineering for the Government," Proceedings of the 1991 Conference of the Southeast Decision Sciences Institute, p. 225.
1990Das, Sidhartha R. and Merrill E. Warkentin. "A Knowledge-based Expert System for Focus Forecasting," Proceedings of the 1990 Annual National Conference of the Decision Sciences Institute.
1990Carlson, Christopher K., Stephen R. Ruth, Merrill E. Warkentin, and Jerry Zamer. "Contract Termination Processing for Naval Supply Demand Review (SDR) Actions," Proceedings of the Artificial Intelligence Applications for Military Logistics Symposium, The Logistics Directorate (J-4), DoD/JCS and the American Defense Preparedness Association, March 28-31, 1990, Williamsburg, VA.
1989Carlson, Christopher K., Stephen R. Ruth, and Merrill E. Warkentin. "A Micro-based Decision Support System (DSS) for Contract Termination Processing," Proceedings of the 1989 Conference of the Northeast Decision Sciences Institute..
1989Holmes, William T. and Merrill E. Warkentin. "The Computer-Assisted Real Estate Market Analyst: A Knowledge-Based Real Estate Market Analyst," Proceedings of the 1989 Conference of the Northeast Decision Sciences Institute.
1989Das, Sidhartha R., Shaker A. Zhara, and Merrill E. Warkentin. "Organizational Strategy and Strategic Planning for MIS: Linkages Within the Miles-Snow Types," Proceedings of the 1989 Conference of the Southeast Decision Sciences Institute (winner of the SEDSI "Outstanding Achievement Award for the Best Theoretical/Empirical Research Paper").
1988Warkentin, Merrill E. "The Knowledge-Based Information Presenter: An Intelligent DSS Interface," Proceedings of the 1988 Annual National Conference of the Decision Sciences Institute.
1988Warkentin, Merrill E. and Stephen R. Ruth. "Teaching Expert Systems in Undergraduate MIS Curricula: A Practical Perspective," Proceedings of the 1988 Annual National Conference of the Decision Sciences Institute.
1988Warkentin, Merrill E., Julie E. Kendall, and Kenneth E. Kendall. "Knowledge Engineering Using STROBE: Structured Observation of the Expert's Environment," Proceedings of the 1988 Annual National Conference of the Decision Sciences Institute.
1988Warkentin, Merrill E. and Stephen R. Ruth. "Expert System Implementation: A Longitudinal Study," OR and AI: Essentials to Productivity Enhancement -- Technology to Help Americans "Work Smarter" (Proceedings of the 1988 Symposium of the Washington Operations Research and Management Science Council), pp. 35-49.
1988Das, Sidhartha R., Merrill E. Warkentin, and Christopher K. Carlson. "FOCUSYS: A Knowledge-Based Expert System for FOCUS Forecasting," OR and AI: Essentials to Productivity Enhancement -- Technology to Help Americans "Work Smarter" (Proceedings of the 1988 Symposium of the Washington Operations Research and Management Science Council), pp. 16-34.
1988Warkentin, Merrill E. and Julie Kendall. "Computer Monitoring of Work Performance: Some Organizational Issues," Proceedings of the 1988 Annual Conference of the Northeast Decision Sciences Institute.
1987Warkentin, Merrill E. and Christopher K. Carlson. "Beyond Expert System Applications: The Knowledge-Based Organization of the Future," Proceedings of the 1987 Conference on Expert Systems in Business and Finance, (ISBN 0-938734-23-7), pp. 39-44.
1987Warkentin, Merrill E. and Kenneth E. Kendall. "GRIDS: Geographically-Referenced Information for Decision Support, An Application of DSS to State Patrol Manpower Allocation," Proceedings of the 1987 Conference of the Northeast Decision Sciences Institute, pp. 209-211.
1986Warkentin, Merrill E. and Kenneth E. Kendall. "A Decision Support System for Locating Branch Banks," Proceedings of the 1986 Annual National Conference of the Decision Sciences Institute.
1985Parker, Thomas H. and Merrill E. Warkentin. "Environmental Uncertainty and its Impact on Strategic Information System Design," Proceedings of the 1985 Annual National Conference of the American Institute of Decision Sciences.
1985Warkentin, Merrill E. "MRP and JIT: Teaching the Dynamics of Information Flows and Material Flows with System Dynamics Modeling" , Proceedings of the 1985 International Conference of the System Dynamics Society, pp. 1017-1028.



Grants, Contracts, and Funded Research
YearAmountDescription
2014$170,471McGrew, Robert (“Wesley”) (PI) and Merrill Warkentin, “Project Idaho Bailiff,” security research funded by the Department of Defense, (funded July 2014), $170,471, 2014-2015.
2014$225,000Kirkley, Sonny, Alan R. Dennis (co-PIs) and Merrill Warkentin, “STTR Phase I: Digital Gaming Infrastructure (DIGI) Innovating Undergraduate STEM Courses via an Immersive Game-Based Approach to Teaching and Learning,” (funded June 2014), $225,000. (will be co-PI for Phase II and Phase III, up to $3 million), 2014-2015.
2011$2,000Warkentin, Merrill (P.I.) with Dave Dampier, Stacy Haynes, Byron Williams, and Shelley Matthews, "IS Security / Insider Abuse Working Group Using Forensics and Criminology to Investigate Causes and Preventions of Insider Abuse," MSU ORED interdisciplinary, cross-college research seed grant, 2011-2012, $2,000.
2011$2,000Sherman-Morris, Kathy (P.I.) with Lesley Strawderman, Daniel Carruth, Phillip Poe, Kay Brocato, Karen McNeal, Merrill Warkentin, and Andrew Luccasen. "Risk Perception Working Group" - MSU ORED interdisciplinary, cross-college research seed grant, 2011-2012, $2,000.
2011$96,212"Exploring the Role of Individual Employee Characteristics and Personality on Employee Compliance with Cyber Security Policies," Institute for Homeland Security Solutions (IHSS), $96,212, (Merrill Warkentin, Lemuria Carter, and Maranda McBride, Principle Investigators). IHSS is a federally funded collaborative initiative which coordinates its research activities with the U.S. Department of Homeland Security's Human Factors/Behavioral Sciences Division.
2010$2,000"Wireless Communication Working Group" - MSU ORED interdisciplinary, cross-college research seed grant.
2007$83,462"E-Commerce and E-Learning: A Win-Win Combination", funded by USDA Cooperative State Research, Education, and Extension Service (Julie S. Sexton -- principal investigator, with Brian M. McCann and Merrill Warkentin). Resulting Project is Electronic Retailing Self-Paced Course
2005-2006$10,000"User Awareness of Organizational Security Policies and Procedures," Department of Defense (DoD) National Security Agency (NSA) Information Assurance Scholarship Program (via CCSR), August 1, 2005-August 31, 2006. (Merrill Warkentin, principal investigator)
2005-2006$8,000"State IT Consolidation Programs and their Impact on IT Security," Center for Computer Security Research Travel Grant, August 1, 2005-August 31, 2006. (Merrill Warkentin, principal investigator)
2003$2,991"Dreamweaver software licenses and digital camera," 2003 Ottilie Schillig Special Teaching Projects Program, $2,991.00, approved and funded. (Robert Moore -- principal investigator, Merrill Warkentin, and Kirk Arnett)
2003$10,000"Identifying and Evaluating Technical and Behavioral Antecedents of Citizen Adoption of eGovernment Processes," MSU Research Initiation Program, 2003, Principle Investigator.
2002$10,000"System Security Management in the Post 9/11 Era," Department of Defense (DoD) National Security Agency (NSA) Information Assurance Scholarship Program, Principle Investigator.
2002$10,000"Encouraging Citizen Adoption of eGovernment: A Multi-National Study," Pricewaterhouse Coopers Endowment for the Business of Government, June 28, 2002. Pavlou, Paul, David Gefen, Merrill Warkentin, and Gregory Rose (Co-PIs).
1996$370,302"A Model of Interdisciplinary, Integrated Distributed Learning," funded by The GE Fund Learning Excellence Initiative (Gerald Voland, P.I.), June 1996 (revised October 1996), funded, project known as the SMILE project - Structured Modeling of Interactive Learning Environments.
1993$6,000"Economic Analysis of Emerging Information Technology and its application for Regional Development," funded by the Rhode Island CIBED, 1993-94, with Richard Glass, Co-Principle Investigator.
1993$3,000"Emerging Paradigms for Knowledge Acquisition Methodologies," funded by the Peat Marwick Research Fund, Principle Investigator.
1988$5,300"Improving Decision Support Software Effectiveness Through AI-Based Interfaces," funded by the Software AG Research Grant Program, Principle Investigator.



Work in Progress
I have over twenty articles under review (many are "Revise and Resubmit" now) at various peer-reviewed journals (at MISQ, ISR, JMIS, JAIS, EJIS, I&M, and others). (Details withheld to maintain anonymity of review process.) I am also actively engaged in dozens of additional empirical research projects, some at data analysis stage, some at data collection stage, some at instrument validation stage, and others at model formulation (theory development) stage.
My primary research interests are in situational, organizational, and dispositional antecedents of individual behaviors in the context of information systems security and privacy. I also work in the areas of eGovernment adoption and interactions within virtual teams (computer-mediated communication systems).
In security, my focus is on the successful application of behavioral controls and organizational policy, especially as they relate to insider abuse and employee compliance with security and privacy policies. With my colleagues, we have explored the use of organizational influences, such as fear appeals, that lead to increased levels of secure behaviors by employees, which is the top-ranked source of security threat to organizations.
In eGovernment and eCommerce, my focus has been on website design issues, the use of intelligent agents, and other IT artifact issues, but I have also looked at eCommerce and eGovernment strategy, user adoption issues, website design maturity, and related research questions.
In computer-mediated communication systems (CMCS), virtual teams, and collaboration systems, my focus is on both synchronous and asynchronous systems and how the technologies can be designed and implemented for maxium benefit to the organization. We have looked at issues related to message interruption, information sharing, virtual teamwork training, and other characteristics of such systems.



Professional Activities
YearDescription
 NOTE: This list includes selected EXTERNAL (Professional) Activities -- not committee assignments, advising, and other internal service activities normally conducted by all faculty.
A complete list of university and college committee activites, program management, and other internal activities is available upon request.
This list also does NOT include consulting activities.
2016Program Co-Chair, Americas Conference on Information Systems (AMCIS) - San Diego
2015Track Chair for Security Track, Americas Conference on Information Systems (AMCIS) - Puerto Rico
2014-2017Senior Editor, AIS Transactions on on Replication Research
2012-2015Associate Editor of MIS Quarterly
2012-2015Associate Editor of Information & Management
2014-2015Associate Editor, Decision Sciences Journal
2013-2015Chair, International Federation of Information Processing (IFIP) Working Group 8.11 / 11.13 on "Information Systems Security Research"
2013-2014Departmental Editor for IS Security, AIS
2014Co-Chair, ICIS Mid-Career Consortium (Auckland), member of ICIS Program Committee
2014Chair, Search Committee for next Editor-in-Chief of Decision Sciences journal
2014Member, Association for Information Systems (AIS) SIGs and Chapters Committee
2014Member, Association for Information Systems (AIS) SIGSec Nominating Committee
2014External Reviewer for Candidate for Promotion and Tenure, HEC Paris
2014External Reviewer for Candidate for Promotion and Tenure, University of South Carolina
2014External Reviewer for Candidate for Promotion and Tenure, Al-Zaytoonah Private University of Jordan
2014Manuscript Reviewer, Communications of the AIS
2013Track Chair, Security & Privacy Track, 2013 International Conference on Information Systems (ICIS)
2013Guest Editor, Special Issue of European Journal of Information Systems on Cross-Cultural Research in Information Systems
2013External Reviewer for Candidate for Promotion and Tenure, Brock University (Canada)
2013External Reviewer for Candidate for Promotion and Tenure, University at Binghamton (SUNY)
2010-2012Associate Editor, European Journal of Information Systems
2010-2012Vice Chair, International Federation of Information Processing (IFIP) Working Group 8.11 / 11.13 on "Information Systems Security Research"
2009-presentMember, Editorial Review Board, Journal of Computer Information Systems
2004-presentAssociate Editor, Journal of Information Systems Security
2004-presentAssociate Editor, Journal of Information Science and Technology
2002-presentAssociate Editor, Information Resources Management Journal
2012External Reviewer for Candidate for Promotion to Full Professor, Texas Tech University
2012External Reviewer for Candidate for Tenure and Promotion to Associate Professor, Villanova University
2012External Reviewer for Candidate for Tenure and Promotion to Associate Professor, University of Massachusettes - Boston
2012Track Co-Chair, European Conference on Information Systems (ECIS), IS Security & Privacy Track (Barcelona)
2012Manuscript Reviewer, Decision Sciences
2012Member, Joint Program Committee, 2012 Annual Symposium on Information Assurance and 2012 Secure Knowledge Management Workshop
2011Manuscript Reviewer, MIS Quarterly
2011Manuscript Reviewer, Decision Sciences
2010-presentMember, Editorial Advisory Board, Information Management & Computer Security
2011Member, Program Committee, The Dewald Roode Information Security Workshop 2011
2011Member, Program Committee, European Security Conference
2011Senior Program Committee Member, 13th Annual International Conference on Enterprise Information Systems (ICEIS2011)
2011External Reviewer for Candidate for Promotion and Tenure, University of Nebraska - Omaha
2011External Reviewer for Candidate for Promotion to Full Professor, Southern Illinois University - Carbondale
2011External Reviewer for Candidate for Promotion to Full Professor, University of Minnesota - Duluth
2010Member, Program Committee, The Dewald Roode Information Security Workshop 2010 - (alternate link)
2010Member, Program Committee, 2010 Workshop on Information Security & Privacy (WISP), a pre-ICIS conference
2010Manuscript Reviewer, Communications of the ACM
2010Manuscript Reviewer, Hawaii International Conference on System Sciences (HICSS)
2010Manuscript Reviewer, Journal of Computer Information Systems
2010Invited to serve as Research Grant Evaluator for the Netherlands Organisation for Scientific Research (NWO) Innovational Research Incentives Scheme
2008-2010Associate Editor (AE), MIS Quarterly Special Issue on "Information System Security in a Digital Age"
2008-2009Co-Guest Editor, European Journal of Information Systems - Special Issue on "Behavioral and Policy Issues in Information Systems Security"
2008-2009Ad Hoc Associate Editor (AE), MIS Quarterly
2009Invited to serve as Research Grant Evaluator for the Standard Research Grants program of the Social Sciences and Humanities Research Council of Canada (SSHRC)
2009External Reviewer for Candidate for Promotion to Full Professor, New Jersey Institute of Technology (NJIT)
2009Co-Chair, 2009 Workshop on Information Security and Privacy (WISP, pre-ICIS conference)
2009Program Chair, IFIP International Conference on IS Security Research
2009Associate Editor, IS Security Track, International Conference on Information Systems (ICIS)
2009Invited Reviewer for Information Systems Journal
2009Senior Program Committee Member, 11th Annual International Conference on Enterprise Information Systems (ICEIS2009)
2009Manuscript Reviewer, Information Systems Journal (2 manuscripts in 2009)
2007-2008Member, Decision Sciences Institute (DSI) Doctoral Student Affairs Committee
2008Co-Chair, Decision Sciences Institute (DSI) 2008 Information Security Track
2008Manuscript Reviewer, Information Systems Research
2008Manuscript Reviewer, Decision Support Systems
2008Manuscript Reviewer, AIS European Conference on Information Systems (ECIS2008)
2008External Reviewer for Candidate for Promotion to Full Professor, University of Colorado - Denver
2008External Reviewer for Candidate for Tenure and Promotion to Associate Professor, University of Central Florida
2008Nominee, External Reviewer for Candidate for Promotion to Full Professor, Northern Illinois University
2008External Reviewer for Candidate for Tenure and Promotion to Associate Professor, University of Massachusettes - Boston
2008Senior Program Committee Member, 10th Annual International Conference on Enterprise Information Systems (ICEIS2008)
2008Manuscript Reviewer, Hawaii International Conference on System Sciences (HICSS)
2007-2008Nominee, External Reviewer for Candidate for Promotion to Full Professor, Drexel University
2007Associate Editor, 2007 ICIS Info Systems Privacy & Security Track
2007Associate Editor (AE) for Information Security manuscript submission, MIS Quarterly
2007External Reviewer for Candidate for Promotion to Full Professor, UMBC
2007Co-Chair, 2007 Workshop on Information Security and Privacy (WISP, pre-ICIS conference)
2007External Reviewer for Candidate for Tenure and Promotion to Associate Professor, Information Systems University of the Western Cape (Republic of South Africa)
2007International Programme Committee Member, International Conference on Human Aspects of Information Security & Assurance (HAISA2007)
2007Senior Program Committee Member, 9th Annual International Conference on Enterprise Information Systems (ICEIS2007)
2007Manuscript Reviewer, MIS Quarterly
2006-2007External Reviewer for Candidate for Tenure and Promotion to Associate Professor, The University of Memphis
2006Discussant, International Conference on Information Systems (ICIS), Security and Assurance Track
2006Member, Advisory Committee, Workshop on Information Security and Assurance (WISA), the SIGSEC pre-ICIS Workshop, Milwaukee, WI, Dec. 10, 2006
2006Associate Editor, International Conference on Information Systems (ICIS), Security and Assurance Track
2006Member, Program Committee for Workshop on Electronic Business (WEB2006) - Pre-ICIS Workshop
2006Member, Advisory Board & Program Committee for SIGDSS Pre-ICIS Workshop, 2006
2006International Program Committee, International Network Conference, Plymouth, UK, June 2006
2006Conference Program Co-Chair, ISOneWorld Conference
2006Senior Program Committee Member, 8th Annual International Conference on Enterprise Information Systems (ICEIS2006)
2005Member, Program Committee, 2005 WEB Workshop (Pre-ICIS conference), Las Vegas, December 2005
2005Associate Editor, International Conference on Information Systems (ICIS), Security and Assurance Track
2005Associate Editor, International Conference on Information Systems (ICIS), Alternative Approaches to Information Systems Development Track
2005-2006Nominee, External Reviewer for Candidate for Promotion to Full Professor, The University of Memphis
2005-2006External Reviewer for Candidate for Promotion and Tenure, University of Central Florida
2005-2006Nominee, External Reviewer for Candidate for Promotion, The University of Memphis
2005-2006External Reviewer for Candidate for Promotion and Tenure, Lehigh University (Pennsylvania)
2005Manuscript Reviewer, Communications of the ACM
2005Manuscript Reviewer, Computers and Industrial Organization
2005Reviewer, Encyclopedia of E-Commerce, E-Government and Mobile Commerce
2005Reviewer, Proceedings of the 2005 Decision Sciences Institute (DSI) Annual Meeting
2005External Reviewer for Candidate for Promotion and Tenure, Bar-IlanUniversity (Israel)
2005Manuscript Reviewer, Journal of Information Technology Theory and Application
2005Conference Program Co-Chair, ISOneWorld Conference
2005Senior Program Committee Member, 7th Annual International Conference on Enterprise Information Systems (ICEIS2005)
2004Program Committee Member, Information Resources Management Association (IRMA) Conference
2004Program Committee Member, Third International Workshop on E-Business (WEB2004, pre-ICIS conference)
2004Manuscript Reviewer, Journal of Information Technology Theory and Application
2004Manuscript Reviewer, MIS Quarterly
2004External Reviewer for Candidate for Promotion and Tenure, University of Tulsa
2003-2004Senior Associate Editor, eGovernment Quarterly
2002-2004Associate Editor, Journal of Electronic Commerce in Organizations
2004Member, Local Organizing Committee, Information Resources Management Association (IRMA) National Conference
2004Track Chair (eCommerce Technologies Management), Information Resources Management Association (IRMA) National Conference
2004Senior Program Committee Member, 6th Annual International Conference on Enterprise Information Systems (ICEIS2004)
2004Conference Program Co-Chair, ISOneWorld Conference
2003Track Chair, Decision Support Systems Track, 2003 National Conference of the Decision Sciences Institute (DSI)
2003Program Committee, National Conference of the Information Resources Management Association (IRMA)
2003Senior Program Committee Member, International Conference on Enterprise Information Systems (ICEIS2003)
2003Grant Proposal Review Panelist, National Science Foundation, DUE-CCLI, January 22-25, 2003
2003Grant Proposal Review Panelist, National Science Foundation, DUE-SFS, January 27-28, 2003
2003Guest Editor, Special Issue on Etail Research, Journal of End User Computing
2003Manuscript Reviewer, MIS Quarterly
2003Manuscript Reviewer, Communications of the ACM
2003Manuscript Reviewer, IBM Systems Journal
2003Manuscript Reviewer, Journal of Electronic Commerce Research
2003Manuscript Reviewer, International Journal of Electronic Commerce
2003Manuscript Reviewer, Electronic Government Journal
2003Research in Progress Chair, ISOneWorld Conference, 2003.
2002External Reviewer for Candidate for Promotion and Tenure, Villanova University
2002External Reviewer for Candidate for Promotion and Tenure, Oakland University
2002External Reviewer for Candidate for Promotion and Tenure, Clark University
2002External Reviewer for Candidate for Promotion and Tenure, Portland State University
2002Senior Editor and Track Co-Chair, Decision Support Systems Track, AIS 2002 Americas Conference on Information Systems (AMCIS)
2002Senior Program Committee Member, International Conference on Enterprise Information Systems (ICEIS2002)
2002Track Chair, Mobile Commerce Track, IS OneWorld Conference
2002Manuscript Reviewer, Journal of Information Technology Cases and Applications
1998-2002Member, Editorial Board, Information Resources Management Journal
2001Program Committee Member, International Conference on Enterprise Information Systems (ICEIS 2001)
2001Manuscript Reviewer, MIS Quarterly
2001Manuscript Reviewer, AIS European Conference on Information Systems (ECIS2001)
2001Project Reviewer, National Science Foundation, Small Business Innovation Research (NSF-SBIR), Proposal #2000-0110278
1997-2000Manuscript Reviewer, Decision Sciences Journal
1986-2001Manuscript reviewer, Discussant, Session Chair, Decision Sciences Institute (DSI) National Conference
1996-2000Manuscript Reviewer, IEEE Transactions on Engineering Management
2000Manuscript Reviewer, 2002 International Conference on Information Systems (ICIS)
2000Manuscript Reviewer, AIS Americas Conference on Information Systems (AMCIS)
1992-2000Manuscript reviewer, Session Chair, Discussant, Northeast Decision Sciences Institute Conference
1999External Reviewer for Candidate for Promotion and Tenure, LeMoyne College
1999Manuscript Reviewer, Information Systems Journal
1999Manuscript Reviewer, AIS Americas Coonference on Information Systems (AMCIS 1999)
1999Manuscript Reviewer, 1999 International Conference on Information Systems (ICIS)
1999Manuscript Reviewer, Hawaii International Conference on System Sciences (HICSS)
1998Program Chair, National Conference of Information Resources Management Association (IRMA), 1998.
1998External Reviewer for Candidate for Promotion and Tenure, University of Hartford
1998Track Chair, Decision Support Systems Track, National Conference of the Decision Sciences Institute (DSI)
1992-1997Associate Editor, ACM Applied Computing Review
1997Track Chair, Multimedia Track, National Conference of the Information Resources Management Association (IRMA)
1997Manuscript Reviewer, MIS Quarterly
1995Guest Editor, The Journal of Intelligent Technologies
1995Ad Hoc Committee on Advanced Information Technology, Decision Sciences Institute (DSI)
1994Associate Editor of HEURISTICS: The Journal of Knowledge Engineering & Technology
1994Publicity Chair, IEEE International Conference on Developing and Managing Intelligent System Projects
1994External Reviewer for Candidate for Promotion and Tenure, University of New Hampshire
1993Manuscript reviewer, Second World Congress on Expert Systems
1992Guest Editor, HEURISTICS: The Journal of Knowledge Engineering & Technology
1991Program Committee Member, Reviewer, Panel Chair, ACM/IEEE Joint Conference on Managing Expert Systems
1991Paper Session Chair, Paper Reviewer, First World Congress on Expert Systems
1991Manuscript Reviewer, National Conference of the Information Resources Management Association (IRMA)
1990Manuscript Reviewer, Hawaii International Conference on System Sciences (HICSS)
1988-1991Manuscript Reviewer, Session Chair, Southeast Decision Sciences Insitute (DSI) Conference
1989Manuscript Reviewer, Decision Sciences (Journal)
1989Paper Reviewer, Hawaii International Conference on System Sciences (HICSS)
1989Local Arrangements Chair/Coordinator, Washington OR/MS Council (WORMSC) Symposium
1988Session Chair, Washington OR/MS Council (WORMSC) Symposium
1985Editor, Proceedings of the International Conference of the System Dynamics Society



Other Activities
YearDescription
 Member, Association for Information Systems (AIS)
 Member, Decision Sciences Institute (DSI)
 Member, Association for Computing Machinery (ACM)
 Member, Information Resources Management Association (IRMA)
 Member, International Association for Computer Information Systems (IACIS)



Honors
YearDescription
 NOTE: This partial listing does not include appointments to numerous national and international conference program committees and senior program committees, nor does it include appointments as track chair at DSI (three times), Associate Editorships at journals (e.g. MISQ, EJIS, etc.), AE for ICIS (four times), nor other leadership honors at various journals, conferences, and organizations.
2011Awarded the John and Carole Ferguson Notable Scholar Award, 2011-2012
2011Awarded Charles A. Jordan Faculty Support Fund State Pride Award, 2011-2012
2010Awarded, MSU College of Business Outstanding Researcher Award
2009Awarded (with Michael Brian Pope, Leigh A. Mutchler, and Xin Luo) one of three MIS "Distinguished Track" Papers in MIS at National Decision Sciences Institute (DSI) Conference for "The Domain Name System: Past, Present, and Future," Proceedings of the National Decision Sciences Institute (DSI) Annual Conference, New Orleans, November 2009, pp. 2211-2216.
2010Awarded the Mr. and Mrs. Charles A. Jordan, Jr. State Pride Award, 2010-2011
2009Program Co-Chair, IFIP International Workshop on Information Security Research (Cape Town, South Africa)
2009Program Co-Chair, 2009 Pre-ICIS Workshop on Information Security and Privacy (WISP 2009)
2009Nominated for position of Vice President of Decision Sciences Institute (DSI)
2009Appointed to serve as Vice Chair, International Federation of Information Processing (IFIP) WG8.11 on IS Security Research
2009Named one of the MSU College of Business's Notable Scholars
2007Co-Chair, Second Workshop on Information Security and Privacy (WISP), pre-ICIS workshop
2006ISOneWorld Conference, Conference Program Co-Chair
2004Awarded (with Kimberly Davis and Teko (Ernst) Bekkering) the 2004 Outstanding Collaborative Research Award (MSU-COBI)
2004ISOneWorld Conference, Conference Program Co-Chair
2003Selected by the National Science Foundation (NSF) as a Proposal Review Panelist (2 panels)
2002Winner of Mississippi State University 2002 Faculty Research Award for the College of Business & Industry
2001Winner of "Outstanding MIS Paper Award" at Western Decision Sciences Institute Conference (with Ross Hightower and Lutfus Sayeed)
2000Selected by the National Science Foundation (NSF) as a Proposal Reviewer
1999Voted as one of the Top Ten "Best Teachers of the Year" by the NU Chapter of Beta Gamma Sigma, the honor society for Business Administration, (out of over 120 faculty members - professors and instructors).
1998Awarded the "Organizational Leadership Award" by the Information Resources Management Association (IRMA)
1996Named "Distinguished Lecturer" by the Association for Computing Machinery (ACM), the oldest and largest professional IT organization in the world.
1996"The Art & Craft of Discussion Leadership", Executive Seminar, Harvard Business School
1994Nominated for "Outstanding Bryant College Teacher" award by Bryant College chapter of ASM
1995Nominated for Best Paper at Northeast Decision Sciences Institute Conference
1989Winner of "Best Theoretical/Empirical Research Paper" award at 1989 Southeast Decision Sciences Institute Conference (with Sidhartha R. Das and Shaker A. Zhara)



File sharing


printer friendly version

mobile web site


 updated Oct 23, 2014WebmasterLegal