Kent Marett’s research while affiliated with Mississippi State University and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (16)


Detecting deception in computer-mediated communication: the role of popularity information across media types
  • Article

January 2024

·

10 Reads

Information and Computer Security

Akmal Mirsadikov

·

Ali Vedadi

·

Kent Marett

Purpose With the widespread use of online communications, users are extremely vulnerable to a myriad of deception attempts. This study aims to extend the literature on deception in computer-mediated communication by investigating whether the manner in which popularity information (PI) is presented and media richness affects users’ judgments. Design/methodology/approach This study developed a randomized, within and 2 × 3 between-subject experimental design. This study analyzed the main effects of PI and media richness on the imitation magnitude of veracity judges and the effect of the interaction between PI and media richness on the imitation magnitude of veracity judges. Findings The manner in which PI is presented to people affects their tendency to imitate others. Media richness also has a main effect; text-only messages resulted in greater imitation magnitude than those viewed in full audiovisual format. The findings showed an interaction effect between PI and media richness. Originality/value The findings of this study contribute to the information systems literature by introducing the notion of herd behavior to judgments of truthfulness and deception. Also, the medium over which PI was presented significantly impacted the magnitude of imitation tendency: PI delivered through text-only medium led to a greater extent of imitation than when delivered in full audiovisual format. This suggests that media richness alters the degree of imitating others’ decisions such that the leaner the medium, the greater the expected extent of imitation.



Virtual Lies and Digital Truths: A Review of Research on Deception in Online Communication

January 2024

·

3 Reads

Virtual Lies and Digital Truths: A Review of Research on Deception in Online Communication reviews previous research that lies at the intersection of deception and computer-mediated communication and examines future directions that this research may be attuned to. As new varieties of online deception attract new researchers to the research effort, particularly within the field of management information systems, reviewing where the research stream originated and where it appears to be heading could be enlightening to those who hope to engage further with the topic. This monograph is organized as follows. Following discussion defining and contextualizing deception within the field of information systems research, the authors review some of the prominent theories that have helped inform studies on the topic. These include seminal theories developed in the fields of communication, IS theory and other relevant disciplines that have helped explain deceptive communication and its detection across computer-based modalities. Key findings and implications from across research disciplines are reviewed. Then, the incidence of deceptive communication across generations of media and technology platforms is discussed. Finally, the monograph concludes with an overview of potentially important research gaps and a call for interested researchers to continue investigating deception in computer-mediated communication.


WLB perspectives and the relative importance of management strategies (adopted from Sarker et al. 2012)
Security compliance and work-issued mobile devices: Out of sight, out of mind?
  • Article
  • Publisher preview available

October 2023

·

15 Reads

Information Systems and e-Business Management

For security, economic, and efficiency reasons, many businesses supply mobile devices to employees to use both in the workplace and remotely, accompanied by policies governing their appropriate use. Extant research has shown that work-issued mobile devices can disrupt employees’ perceptions of work-life balance (WLB) and, indeed, WLB can impact employees’ job satisfaction and performance. The global COVID-19 pandemic meant that more employees than usual performed their work remotely, but this situation may have not fit the preferred WLB for some. Did this encroachment mean that appropriate use policies were forgotten? We conducted two rounds of surveys, one pre-pandemic and the other mid-pandemic, to determine whether those workplace changes led some employees astray. In other words, which type of WLB perceptions are more likely to lead to policy violations and how does the WLB mismatch cause deviant behaviors before and during the pandemic? The results from cluster analysis and the comparison between the pre and mid-pandemic suggest that policy violators were present in both time periods, but before the pandemic violators were in more compartmentalized work settings and mid-pandemic violators dominated all work settings.

View access options


Local Learning from Municipal Ransomware Attacks: a Geographically Weighted Analysis

May 2021

·

29 Reads

·

2 Citations

Information & Management

The prevalence of security threats like ransomware continues to increase and victimize a wide range of targets, which includes municipal information systems. These attacks are commonly reported in media outlets available in attacked communities. This study seeks to understand how effective news reporting can be toward influencing the behavior of people who live within the proximity of the attack. The results suggest a geographic influence on individual behaviors that could well extend beyond the context of information security into other areas of behavioral IS research.


Information Security Practices in Small-to-Medium Sized Businesses: A Hotspot Analysis

January 2021

·

11 Reads

·

2 Citations

Small to medium-sized enterprises (SMEs) in North America do not always adequately address security. Based on responses from 232 SME owners and managers, the authors found that the adoption of security recommendations made by experts appear to be significantly influenced by the decisions of other local SMEs. A hot-spot analysis of information security practices suggested that local trends lead to prioritizing certain security practices and not adopting others. Follow-up interviews with business owners and Chamber of Commerce directors provided insights on how security hotspots developed or not. The study identified both hot spot and cold spot communities, and sought to assess how local business networking conduits like chambers of commerce help promote best security practices


Information Security Practices in Small-to-Medium Sized Businesses: A Hotspot Analysis

January 2021

·

21 Reads

Small to medium-sized enterprises (SMEs) in North America do not always adequately address security. Based on responses from 232 SME owners and managers, the authors found that the adoption of security recommendations made by experts appear to be significantly influenced by the decisions of other local SMEs. A hot-spot analysis of information security practices suggested that local trends lead to prioritizing certain security practices and not adopting others. Follow-up interviews with business owners and Chamber of Commerce directors provided insights on how security hotspots developed or not. The study identified both hot spot and cold spot communities, and sought to assess how local business networking conduits like chambers of commerce help promote best security practices


Professionalizing the information security of family firms: A family essence perspective

March 2020

·

61 Reads

·

10 Citations

Journal of Small Business Management

Family firm leaders are often faced with conflicting pressures and goals. One such situation occurs when deciding whether to pursue professionalized management of a business function as opposed to retaining family control. In this study we examine the decision to professionalize the information security function of the firm while also seeking to maintain the family essence of the business. The results show that traditional institutional pressures encourage professionalism, but the move may be inhibited by family essence.


Information Security Practices in Small-to-Medium Sized Businesses: A Hotspot Analysis

April 2019

·

149 Reads

·

4 Citations

Small to medium-sized enterprises (SMEs) in North America do not always adequately address security. Based on responses from 232 SME owners and managers, the authors found that the adoption of security recommendations made by experts appear to be significantly influenced by the decisions of other local SMEs. A hot-spot analysis of information security practices suggested that local trends lead to prioritizing certain security practices and not adopting others. Follow-up interviews with business owners and Chamber of Commerce directors provided insights on how security hotspots developed or not. The study identified both hot spot and cold spot communities, and sought to assess how local business networking conduits like chambers of commerce help promote best security practices


Citations (10)


... Existing literature has indicated that various demographic factors, including sex and class level (Dacillo et al., 2022;Purba et al., 2022;Fauville et al., 2023;Oducado et al., 2022;Salim et al., 2022;Usta Kara & Esroy, 2022), could contribute to shaping individuals' experiences of ZEF. Notably, gender has been implicated in Zoom-related fatigue studies (George et al., 2022;Ratan et al., 2021;Shockley et al., 2021). Emerging research also suggests potential disparities in how individuals perceive and navigate challenges within online interactions based on these factors (Dacillo et al., 2022;Purba et al., 2022;Ratan et al., 2021;Usta Kara & Esroy, 2022). ...

Reference:

Self-Reported Zoom Exhaustion and Fatigue Levels among Physical Education Teacher Education Students in a State University in the Philippines
What do Users Actually Look at During ‘Zoom’ Meetings? Discovery Research on Attention, Gender and Distraction Effects
  • Citing Conference Paper
  • January 2022

... It is only by doing so that enterprises may be able to reduce the change in operational errors during data repair when they are attacked by ransomware, so as to lower the operational downtime resulting from attacks [55]. Currently, the best methods to prevent direct ransomware attacks are to rely on backup, strengthen users' education, install software preventing rogue programs in relevant information-related devices, and prevent users from opening malicious emails, etc. [56]. ...

Local Learning from Municipal Ransomware Attacks: a Geographically Weighted Analysis
  • Citing Article
  • May 2021

Information & Management

... Conceptually, security means the overall manner in which policies, programs, procedures, or measures are deployed to mitigate risk and ensure access to a particular resource. Marett and Barnett (2021) consider that security is about preventing adverse consequences from the intentional and unwarranted actions of users. The objective of information security is to build protection against the users who would do damage, intentional or otherwise on information asset own by the library. ...

Information Security Practices in Small-to-Medium Sized Businesses: A Hotspot Analysis
  • Citing Chapter
  • January 2021

... This often results in slower growth but longer survival of the firm (Belenzon, Patacconi, and Zarutskie 2016). This has been confirmed by studies of family firms managed by married couples, those with more involvement of multiple family members (Miller, Le Breton Xu, Chen, and Wu 2019), or those with private ownership (Marett, Niu, and Barnett 2020). ...

Professionalizing the information security of family firms: A family essence perspective
  • Citing Article
  • March 2020

Journal of Small Business Management

... Also, SMEs might not realize that their employees should be supporting each other. Finally, they might not know that they can obtain security advice from other small businesses who are geographically close to them (Marett and Barnett, 2019). ...

Information Security Practices in Small-to-Medium Sized Businesses: A Hotspot Analysis
  • Citing Article
  • April 2019

... Governments should motivate users to reduce use by exposing them to persuasive messages that contain information about the threats and recommendations to mitigate the threats. Social media are effective channels for making these persuasive messages publicly accessible (Marett et al., 2019;Matook et al., 2022). For example, governments can make Facebook posts or YouTube videos to inform users that problematic use is prevalent and may have severe effects on their wellbeing. ...

A Quantitative Textual Analysis of Three Types of Threat Communication and Subsequent Maladaptive Responses
  • Citing Article
  • September 2018

Computers & Security

... Behavioural science around information security studies incorporates multidisciplinary theories, including psychology, sociology, and criminology [48], including Deterrence Theory (DT), theory of planned behaviour (TPB), Social Bond Theory (SBT), Rational Decision-Making (RDM), Psychological Contract (PC), and Opportunity Theory (OT) [49]. Many studies and research articles on and around information security behaviour focus on factors that influence security behaviour, including policy compliance [50] and [51], factors that motivate employees to follow computer usage policies [52], and preventative measures [50]. These works are underpinned by behavioural theories, which look to provide more context around human cognition. ...

The Impact of Awareness of Being Monitored on Computer Usage Policy Compliance: An Agency View

Journal of Information Systems

... Furthermore, this approach could be useful with data that are generally difficult to obtain by other means (Kabanoff et al. 1995). Additionally, despite some research in the family business literature using content analysis (e.g., Marett et al. 2018), this technique is underutilized (Cleary et al. 2019). Secondly, following Jain et al. (2023), the Chairman's Statements are considered the most suitable to capture various FI-BER dimensions of SEW in the case of family firms. ...

Socioemotional wealth importance within family firm internal communication
  • Citing Article
  • January 2018

Journal of Family Business Management

... Sixth, this study uses Amazon Mechanical Turk to collect all the data. While Mturk is regarded as a credible resource Marett et al., 2017), other sources of data could be used in the future to replicate our findings. ...

Beware the Dark Side: Cultural Preferences for Lying Online

Computers in Human Behavior

Kent Marett

·

·

·

[...]

·

Gabriel Giordano

... Mimetic pressure is considered to be a standard organisational answer to uncertainty (DiMaggio and Powell, 1983), such as the implied economic paradigm shift that the utilisation of IS for environmental purposes has been argued to represent (Chen et al., 2009;Wang, Brooks and Sarker, 2015b). The organisational adoption of such practices has been discussed to be legitimised either when mimicking the industry leader or the competition, when considered as more successful than the industrial norm Marett, Otondo and Taylor, 2013;Wang, Brooks and Sarker, 2015b). Using the three NRBV strategies as constructs to frame the measure of their empirical study, Chen et al.'s (2009) results highlight the organisational precaution of adopting such systems. ...

Assessing the Effects of Benefits and Institutional Influences on the Continued Use of Environmentally Munificent Bypass Systems in Long-Haul Trucking
  • Citing Article
  • December 2013

MIS Quarterly