Kent Marett PhD

 Kent Marett PhD

Title:

  • Professor of Information Systems

Contacts:

lkm2@msstate.edu
Office: (662) 325-7001
302H
Visit Website for Kent Marett

Overview

Education:

  • Ph D, Management Information Systems, Florida State University, 2004
  • MBA, Business Information Systems, Mississippi State University, 1999
  • BS, Secondary Education, Mississippi State University, 1995

Publications

Book, Chapter

  • Supporting and facilitating conditions to computer workers who dislike working with computers. Organizations and End User Interactions: New Explorations. Hershey PA: IGI Global Publishing. 272-291. 2011
  • Deceptive communication in e-collaboration. Emerging E-Collaboration Concepts and Applications. Ed. N. Kock. Hershey, PA: Idea Group Inc.. 54-68. 2006
  • Detecting deception in computer-mediated communication. Computers in Society: Privacy, Ethics, and the Internet. Upper Saddle River, NJ: Prentice-Hall. 154-166. 2003

Conference Proceeding

  • Perceived deception: An evaluation of technology awareness and self-efficacy.  Dewald Roode Information Security Workshop. 2011
  • The effectiveness of deceptive tactics in phishing.  Proceedings of the 2009 AIS Americas Conference on Information Systems. 2009
  • Detecting deception in computer-mediated interviews.  Proceedings of the 2008 European Conference on Information Systems. 2008
  • Why did I do that? Understanding the deceptive communication in phishing.  Proceedings of the 2007 Hawaii International Conference on System Sciences. 2007
  • Internet abuse: A general theory of crime framework.  Proceedings of the 2006 AIS Americas Conference on Information Systems. 2006
  • The role of decision support in alleviating the familiarity bias.  Proceedings of the 2006 Hawaii International Conference on System Sciences. 2006
  • Vigilance and error detection in an automated command and control environment.  Proceedings of the 2006 Hawaii International Conference on System Sciences. 2006
  • Gender differences in deception detection via electronic media.  Proceedings of the 2005 Hawaii International Conference on System Sciences. 2005
  • Group deception in computer-supported environments.  Proceedings of the 2005 Hawaii International Conference on System Sciences. 2005
  • Self-efficacy, training effectiveness, and deception detection: A longitudinal study of lie detection training.  Proceedings of the 2004 Symposium on Intelligence and Security Informatics. 2004
  • Training to detect deception: An experimental investigation.  Proceedings of the 2004 Hawaii International Conference on System Sciences. 2004
  • Executive use of information technology: What have we been missing?.  Proceedings of the 2001 AIS Americas Conference on Information Systems. 2001
  • Integrating IT and management accounting information: A conceptual framework.  Proceedings of the 2001 AIS Americas Conference on Information Systems. 2001
  • Technology's links to the transaction cost and the knowledge-based views of the firm: A synthesis and extension of the literature.  Proceedings of the 2001 Meeting of the Southern Management Association. 2001
  • The limits of information: Measuring differences between local and distance group attitudes toward distance learning.  Procedings of the 2000 AIS Americas Conference on Information Systems. 2000

Journal Article

Presentations

Oral Presentation

  • "Broadband Internet Access as a Localized Facilitator for Improving Security Knowledge." 2018 Americas Conference on Information Systems, AIS, New Orleans LA. 2018
  • "The Dark Internet: Without Darkness There is No Light." 2016 Americas Conference on Information Systems, Association for Information Systems, San Diego, CA. 2016
  • "Web App Entrepreneurship." Mississippi Broadband Connect Coalition Conference, mbcc.ms, Jackson, MS. 2013

Paper

  • "Local Learning from Municipal Ransomware Attacks." Americas Conference on Information Systems (AMCIS), Association for Information Systems (AIS), Salt Lake City UT (held virtually). 2020
  • "Extending Ecommerce Deception Theory to Phishing." International Conference on Information Systems (ICIS), AIS, Auckland NZ. 2014
  • "Mobile phone use risks and benefits in a high risk context: An Exploratory Study in Afghanistan." 2013 Meeting of the Southern Management Association, , New Orleans, LA. 2013
  • "The Role of Personal Experience When Interpreting Family Business Communication ." Theories of Family Enterprise Conference, Center for Family Enterprise Research, Imperial College, London UK. 2013
  • "An investigation of the impact of abusive supervision on technology end users." 2013 meeting of the Academic and Business Research Institute, Academic and Business Research Institute, Orlando FL. 2013
  • "CollabSec: A multi-­‐player game for researching and teaching information system risk assessment." Pre ICIS Workshop on Information Security and Privacy (WISP), AIS Special Interest Group on Information Security and Privacy, Orlando, FL. 2012
  • "Examining the Coping Appraisal Process in End User Security." Pre ICIS Workshop on Information Security and Privacy (WISP), AIS Special Interest Group on Information Security and Privacy, Orlando, FL. 2012
  • "Feedback distractions during computer-mediated group collaboration." 2011 meeting of the Academy of Management, Academy of Management, San Antonio, TX. 2011
  • "Technology-related pressure and WFC: Main effects and an examination of moderating variables." 2009 meeting of the Academy of Management, Academy of Management, Chicago, IL. 2009

Poster

  • "Blame Distribution Following Information Security Breaches." 2018 Americas Conference on Information Systems, AIS, New Orleans LA. 2018