Merrill Warkentin

Merrill Warkentin is a professor of MIS at Mississippi State University. He has published over 125 research manuscripts, primarily in eCommerce, computer security management, and virtual team research, in books, proceedings, and journals such as MIS Quarterly, Decision Sciences, Decision Support Systems, Communications of the ACM, Communications of the AIS, Information Systems Journal, Journal of End User Computing, Journal of Global Information Management, and others. Professor Warkentin is the co-author or editor of four books, and is currently an associate editor of Information Resources Management Journal and Journal of Information Systems Security. Dr. Warkentin has served as a consultant to numerous organizations and has served as National Distinguished Lecturer for the Association for Computing Machinery (ACM). Previously, Dr. Warkentin held the Reisman Research Professorship at Northeastern University in Boston, where he was also the Director of MIS and E-Commerce programs. Professor Warkentin holds BA, MA, and Ph.D. degrees from the University of Nebraska-Lincoln.

Publications

Experience Matters: The Role of Vicarious Experience in Secure Actions
Leigh A. Mutchler, Merrill Warkentin. © 2020. 20 pages.
Information systems security is a major organizational concern. This study examines the role of vicarious experience on an individual's behavioral intent to perform a secure...
The Influence of Perceived Source Credibility on End User Attitudes and Intentions to Comply with Recommended IT Actions
Allen Johnston, Merrill Warkentin. © 2012. 23 pages.
Through persuasive communications, information technology (IT) executives hope to align the actions of end users with the expectations of senior management and of the firm...
Evolutionary Malware: Mobile Malware, Botnets, and Malware Toolkits
Michael Brian Pope, Merrill Warkentin, Xin (Robert) Luo. © 2012. 9 pages.
Much as information systems themselves evolve and incorporate innovation, so too has malicious software, or “malware.” The increasing threat to those who use and trust in these...
The Influence of Perceived Source Credibility on End User Attitudes and Intentions to Comply with Recommended IT Actions
Allen C. Johnston, Merrill Warkentin. © 2010. 21 pages.
Through persuasive communications, information technology (IT) executives hope to align the actions of end users with the expectations of senior management and of the firm...
An Empirical Assessment of Technology Adoption as a Choice between Alternatives
Ernst Bekkering, Allen C. Johnston, Merrill Warkentin, Mark B. Schmidt. © 2010. 22 pages.
Technology adoption by individuals has traditionally been regarded by information systems researchers as a choice between adoption and non-adoption of a single technology. With...
Foreword
Merrill Warkentin. © 2009. 2 pages.
This Foreword is included in the book Cyber Security and Global Information Assurance: Threat Analysis and Response Solutions.
Consumers' Preferences and Attitudes Toward Mobile Office Use: A Technology Trade-Off Research Agenda
Xin Luo, Merrill Warkentin. © 2009. 9 pages.
Consumer preferences, attitudes, and behavior concerning product choice can be of vital importance in the development process and implementation of innovative products or...
Developments and Defenses of Malicious Code
Xin Luo, Merrill Warkentin. © 2009. 8 pages.
The continuous evolution of information security threats, coupled with increasing sophistication of malicious codes and the greater flexibility in working practices demanded by...
Mobile Banking Systems and Technologies
Cheon-Pyo Lee, Merrill Warkentin. © 2009. 10 pages.
The last decade has witnessed the rapid growth of mobile communication devices and wireless technologies across the globe. The convergence of mobile devices and wireless...
Consumers' Preferences and Attitudes Toward Mobile Office Use: A Technology Trade-Off Research Agenda
Xin Luo, Merrill Warkentin. © 2009. 9 pages.
Consumer preferences, attitudes, and behavior concerning product choice can be of vital importance in the development process and implementation of innovative products or...
An Empirical Assessment of Technology Adoption as a Choice between Alternatives
Ernst Bekkering, Allen C. Johnston, Merrill Warkentin, Mark B. Schmidt. © 2009. 22 pages.
Technology adoption by individuals has traditionally been regarded by information systems researchers as a choice between adoption and non-adoption of a single technology. With...
Introducing the Check-Off Password System (COPS): An Advancement in User Authentication Methods and Information Security
Merrill Warkentin, Kimberly Davis, Ernst Bekkering. © 2008. 17 pages.
The objective of information system security management is information assurance: to maintain confidentiality (privacy), integrity, and availability of information resources for...
A Framework for Evaluating Outsourcing Risk
Merrill Warkentin, April M. Adams. © 2008. 9 pages.
This chapter provides a framework for evaluating and mitigating the risks associated with IT outsourcing projects. Outsourcing projects have been met with successes and many...
Cultural Diversity and Trust in IT Adoption: A Comparison of Potential e-Voters in the USA and South Africa
David Gefen, Gregory M. Rose, Merrill Warkentin, Paul A. Pavlou. © 2008. 14 pages.
To trust means to have expectations about others’ (the trustees’) socially acceptable behavior. One of the central effects of this trust in the context of IT adoption is to...
Check-Off Password System (COPS): An Advancement in User Authentification Methods and Information Security
Merrill Warkentin, Kimberly Davis, Ernst Bekkering. © 2008. 17 pages.
The objective of information system security management is information assurance: to maintain confidentiality (privacy), integrity, and availability of information resources for...
A TAM Analysis of an Alternative High-Security User Authentication Procedure
Merrill Warkentin. © 2008. 16 pages.
The objective of information system security management is information assurance, which means to maintain confidentiality (privacy), integrity, and availability of information...
IT Security Governance and Centralized Security Controls
Merrill Warkentin, Allen C. Johnston. © 2008. 9 pages.
Every enterprise must establish and maintain information technology (IT) governance procedures that will ensure the execution of the firm’s security policies and procedures. This...
Steganography and Steganalysis
Merrill Warkentin, Mark B. Schmidt, Ernest Bekkering. © 2008. 7 pages.
In the digital environment, steganography has increasingly received attention over the last decade. Steganography, which literally means “covered writing,” includes any process...
Steganography
Merrill Warkentin, Mark B. Schmidt, Ernst Bekkering. © 2007. 7 pages.
Steganography, the process of hiding information, can be used to embed information or messages in digital files. Some uses are legitimate, such as digital watermarking or the...
Consumers' Preferences and Attitudes Toward Mobile Office Use: A Technology Trade-Off Research Agenda
Xin Luo, Merrill Warkentin. © 2007. 110 pages.
Consumer preferences, attitudes, and behavior concerning product choice can be of vital importance in the development process and implementation of innovative products or...
A Framework for Evaluating Outsourcing Risk
Merrill Warkentin, April M. Adams. © 2007. 12 pages.
This chapter provides a framework for evaluating and mitigating the risks associated with IT outsourcing projects. Outsourcing projects have been met with successes and many...
Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues
Merrill Warkentin, Rayford Vaughn. © 2006. 406 pages.
Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues brings together authoritative authors to address one of the most pressing challenges...
Culture and Trust in the Adoption of Electronic Voting: A Look at the USA and South Africa
David Gefen, Gregory M. Rose, Merrill Warkentin, Paul A. Pavlou. © 2006. 26 pages.
Trust is a cornerstone of society, and it enables democratic institutes. It captures people’s expectations about others’ (the trustees) socially-acceptable behavior. In the...
Information Integration for Relationship Management
Robert S. Moore, Merrill Warkentin, Melissa Moore. © 2006. 7 pages.
In the past 20 years, an explosion in the ability of firms to acquire and integrate vast amounts of electronic customer information has occurred. For example, in the early 1990s...
Mobile Banking Systems and Technologies
Cheon-Pyo Lee, Merrill Warkentin. © 2006. 6 pages.
The last decade has witnessed the rapid growth of mobile communication devices and wireless technologies across the globe. The convergence of mobile devices and wireless...
IT Security Governance and Centralized Security Controls
Merrill Warkentin, Allen C. Johnston. © 2006. 9 pages.
Every enterprise must establish and maintain information technology (IT) governance procedures that will ensure the execution of the firm’s security policies and procedures. This...
Steganography and Steganalysis
Merrill Warkentin, Mark B. Schmidt, Ernst Bekkering. © 2006. 8 pages.
In the digital environment, steganography has increasingly received attention over the last decade. Steganography, which literally means “covered writing,” includes any process...
Cultural Diversity and Trust in IT Adoption: A Comparison of Potential e-Voters in the USA and South Africa
David Gefen, Gregory M. Rose, Merrill Warkentin, Paul A. Pavlou. © 2005. 25 pages.
To trust means to have expectations about others’ (the trustees’) socially acceptable behavior. One of the central effects of this trust in the context of IT adoption is to...
A TAM Analysis of an Alternative High-Security User Authentication Procedure
Merrill Warkentin, Kimberly Davis, Ernst Bekkering. © 2005. 21 pages.
The objective of information system security management is information assurance, which means to maintain confidentiality (privacy), integrity, and availability of information...
A Synthesis and Analysis of Behavioral and Policy Issues in Electronic Marketing Communications
Merrill Warkentin, Robert S. Moore, Melissa Moore. © 2005. 13 pages.
Marketers now use numerous electronic communication vehicles in which the collection and use of personal information can influence the development of relationships between firms...
Malware and Antivirus Procedures
Xin Luo, Merrill Warkentin. © 2005. 9 pages.
The last decade has witnessed the dramatic emergence of the Internet as a force of inter-organizational and inter-personal change. The Internet and its component technologies...
Introducing the Check-Off Password System (COPS): An Advancement in User Authentication Methods and Information Security
Merrill Warkentin, Kimberly Davis, Ernst Bekkering. © 2004. 18 pages.
The objective of information system security management is information assurance: to maintain confidentiality (privacy), integrity, and availability of information resources for...
Motivation and Search Intensity: An Investigation of Online Consumer Search Behavior
Jason E. Lueg, Robert S. Moore, Merrill Warkentin. © 2004. 16 pages.
The Internet is drawing consumers in search of information about a broad range of topics. In order to understand how consumers search for and benefit from information online...
Patient Health Information Search: An Exploratory Model of Web-based Search Behavior
Jason E. Lueg, Robert S. Moore, Merrill Warkentin. © 2003. 13 pages.
The Internet is drawing consumers in search of information about a broad range of topics. In order to understand how end users search for and benefit from Internet health...
Continuous Demand Chain Management: A Downstream Business Model for E-Commerce
Merrill Warkentin, Akhilesh Bajaj. © 2003. 20 pages.
The demand side of supply chain management has drawn considerable research attention, with focus on disintermediation and syndication models. In this chapter, we evaluate new...
Business to Business Electronic Commerce: Challenges and Solutions
Merrill Warkentin. © 2002. 308 pages.
In the mid 1990s, the widespread adoption of the web browser led to a rapid commercialization of the Internet. In addition, initial success stories were reported from companies...
Dynamic Digital Process Integration in Business-to-Business Networks
Merrill Warkentin. © 2002. 21 pages.
Transparent end-to-end business process integration is the leading edge of today’s business-to-business electronic commerce revolution. Firms enter into electronic...
Intelligent Agents for E-Commerce: Trends and Future Impact on Business Models and Markets
Merrill Warkentin, Vijayan Sugumaran, Ravi Bapna. © 2001. 20 pages.
A characteristic feature of the explosive growth in electronic commerce is the rapid innovation and adoption of new technologies, which results in the creation of new business...