Mississippi State University
Mississippi State University Libraries

Need help?

Live chat

Chat Hours

Call or stop by

Reference Desk:
(662) 325-7667

Desk Hours   Location

MSU Faculty Authors

Author

Merrill Warkentin

Professor, Management and Information Systems

E-mail address: m.warkentin@msstate.edu
Website: http://misweb.cbi.msstate.edu/~COBI/faculty/professor.shtml?mwarkentin


Merrill Warkentin is Professor of MIS and John and Carole Ferguson Notable Scholar in the College of Business at Mississippi State University, where he is also a member of the research staff of the Center for Computer Security Research. He has published over 230 manuscripts, including over 50 journal articles. His research, primarily in computer security management, eCommerce/eGovernment, and virtual teams (computer-mediated collaborative systems), has appeared in such journals as MIS Quarterly, Decision Sciences, European Journal of Information Systems, Decision Support Systems, Communications of the ACM, Communications of the AIS, The DATABASE for Advances in Information Systems, Information Systems Journal, Information Resources Management Journal, Journal of Organizational and End User Computing, Journal of Computer Information Systems, Journal of Global Information Management, Information Systems Management, and others. Professor Warkentin is the author or editor of six books, including Enterprise Information Systems Assurance and System Security: Managerial and Technical Issues.

He is currently an Associate Editor (AE) of MIS Quarterly, European Journal of Information Systems, Information and Management, Information Resources Management Journal, Journal of Information Systems Security, and Journal of Information Science and Technology, and has previously served as AE of other journals. He has Guest Edited several journal special issues, including the European Journal of Information Systems special issue on IS Security in 2009, and has served as an AE for the MIS Quarterly special issue on information security and as ad hoc AE for other security papers at MISQ. He has served on several editorial review boards, and currently serves on the board of the Journal of Computer Information Systems and the editorial advisory board of Information Management and Computer Security. He has held leadership positions for numerous international information security conferences, including Program Chair for WISE2007 and WISP2009, Program Chair for the 2009 IFIP Workshop on IS Security Research, AE at ICIS four times (Security Track), Track Chair at DSI three times (including Security Track in 2008), Security Track Chair at ECIS2012 and Program Committee member of over a dozen international conferences (WISP, WEB, WITS, ICEIS, etc.).

Dr. Warkentin has served as a consultant to numerous companies and organizations, and has been a featured speaker at over one hundred industry association meetings, executive development seminars, and academic conferences. He has been a Lecturer at the Army Logistics Management College and was named a "National Distinguished Lecturer" by the Association for Computing Machinery (ACM). He has been a visiting professor or invited speaker at numerous universities, including Florida State, LSU, Georgia State, Indiana, and Clemson. He has earned various recognitions for his teaching at every level from intro Freshman courses to doctoral research seminars - his primary focus has been teaching Systems Analysis classes and Research Design seminars. His research has been funded by the UN, by various US federal agencies (US Navy, Homeland Security, etc.), and by several companies, including IBM. He was previously on the faculty at George Mason University and held the Reisman Research Professorship at Northeastern University in Boston, where he was also the Director of MIS and eCommerce programs. Professor Warkentin's Ph.D. in MIS is from the University of Nebraska-Lincoln. He can be reached at mwarkentin@acm.org.


Enterprise Information Systems Assurance and System Security

Warkentin, Merrill
Publisher: Idea Group Publishing
2006
ISBN: 159140911X
Collaborators: Rayford Vaughn

This book was edited by a Management Information Systems professor and a Computer Science professor - both of whom believe that a cross-disciplinary approach to the security problem is important and that architected solutions are possible in any enterprise to provide "sufficient" or "adequate" security. The original thought in developing this book was to provide a collection of chapters useful to corporate security staff, government security administrators, and students of security who wish to examine a particular topic in some detail. We sometimes referred to the book as "good airplane reading" because one can read one or two chapters easily on a typical flight. We also considered this book as useful in the classroom. During a typical sixteen week semester, students can spend each week discussing a different chapter of interest. Therefore, the reader can feel free to pick and choose chapters to read in any order - depending simply on the reader's interest. Each chapter stands alone, but they have been grouped into five distinct topic areas - Security Policy and Management; Security Implications for Business; Security Engineering; Security Technologies; and, Authentication Issues. The mix of authors is interesting, too. We have purposely chosen authors to contribute that represent industry (practicing security engineers) as well as academia - and authors that present an international perspective (e.g., Australia, Finland, Singapore, China). There is a mix of practice and research embedded in the chapters - with the stronger emphasis on practice. As such, the reader may on occasion find conflicts in advice or conclusion between chapters. Given that the practice of security today is not exact, this is a natural result of independent views and writings.



Business to Business Electronic Commerce: Challenges and Solutions

Warkentin, Merrill
Publisher: IGI Publishing
2002
ISBN: 1930708092

In the mid 1990s, the widespread adoption of the web browser led to a rapid commercialization of the Internet. In addition, initial success stories were reported from companies that learned how to create an effective direct marketing channel - selling tangible products to consumers directly with the World Wide Web. By the end of the 1990s, the next revolution began - called business-to-business electronic commerce. Business to Business Electronic Commerce will provide researchers and practitioners alike with a source of knowledge related to this emerging area of business.

The audience for this book includes students, scholars, researchers and practitioners. Any currently engaged in the utilization and management of electronic commerce technologies will be interested in Business to Business Electronic Commerce to learn about the latest issues and challenges facing businesses throughout the world.



Electronic Commerce 2002: A Managerial Perspective

Warkentin, Merrill
Publisher: Prentice Hall
2002
ISBN: 0130653012
Collaborators: Efraim Turban, David King, Jae K. Lee, and H. Michael Chung

One of the first texts entirely dedicated to EC, this comprehensive, user-friendly text describes what electronic commerce is; how it is being conducted and managed; and its major opportunities, limitations, issues, and risks. With a blend of theory and practical application, this text is structured around the notion that EC applications require certain technological infrastructures and other support mechanisms. It recognizes that e-business has two parts: business and technology.




Johnston, Allen C. and Merrill Warkentin. "Information Privacy Compliance in the Healthcare Profession" Information Management & Computer Security 16.1 (2008): 5-19.
Bekkering, Ernst, Allen C. Johnston, Merrill Warkentin, and Mark B. Schmidt. "An Empirical Assessment of Technology Adoption as a Choice Between Alternatives" Information Resources Management Journal (2008): forthcoming.
Johnston, Allen C., and Merrill Warkentin. "The Influence of Perceived Source Credibility on End User Attitudes and Intentions to Comply with Recommended IT Actions" Journal of Organizational and End User Computing (2008): forthcoming.
Warkentin, Merrill, Ernst Bekkering and Mark B. Schmidt. "Steganography: Forensic, Security, and Legal Issues" Journal of Digital Forensics, Security, and Law 3.2 (2008): 17-33.
Johnston, Allen C. and Merrill Warkentin. "An XML-Based Intelligent Agent Protocol Design Framework for Individualized Privacy Postures within Trusted Network Environments" Journal of Information Privacy and Security 2.1 (2006): 16-28.
Grefen, David, Gregory M. Rose, Merrill Warkentin and Paul A. Pavlou. "Cultural Diversity and Trust in IT Adoption: A Comparision of Potential e-Voters in the USA and South Africa" Journal of Global Information Management 13.1 (2005): 54-78.
Warkentin, Merrill, Xin Luo, and Gary F. Templeton. "A Framework for Spyware Assessment" Communications of the ACM 48.8 (2005): 79-84.
Warkentin, Merrill, Kimberly Davis and Ernst Bekkering. "Introducing the Check-Off Password System (COPS): An Advancement in User Authentication Methods and Information Security" Journal of Organizational and End User Computing 16.3 (2004): 41-58.
Lueg, Jason E., Robert S. Moore and Merrill Warkentin. "Patient Health Information Search: An Exploratory Model of Web-Based Search Behavior" Journal of End User Computing 15.4 (2003): 49-61.
Tarasewich, Peter and Merrill Warkentin. "Information Everywhere" Information Systems Management 19.1 (2002): 8-13.
Tarasewich, Peter, Robert Nickerson and Merrill Warkentin. "Issues in Mobile E-Commerce" Communications of the AIS 8 (2002): 41-46.
Warkentin, Merrill, David Grefen, Pavlos Pavlou and Greg Rose. "Encouraging Citizen Adoption of eGovernment by Building Trust" Electronic Markets: the International Journal of Electronic Commerce & Business Media 12.3 (2002): 157-162.
Shim, J. P., Merrill Warkentin, James F. Courtney, Daniel J. Power, Ramesh Sharda and Christer Carlsson. "Past, Present, and Future of Decision Support Technology" Decision Support Systems 33.2 (2002): 111-126.
Warkentin, Merrill. "The Next Big Thing in eCommerce" Decision Line 32.1 (2001): 7-10.
Warkentin, Merrill, Vijayan Sugumaran and Ravi Bapna. "eKnowledge Networks for Inter-Organizational Collaborative eBusiness" Logistics Information Management 14.1/2 (2001): 149-162.
Warkentin, Merrill. "Bricks to Clicks, and Back Again" Northeastern University Magazine 26.4 (2001): 14-15.

Warkentin, Merrill and Allen C. Johnston. "Chapter 3: IT Governance and Organizational Design for Security Management." Information Security: Policy, Processes, and Practices. Ed. Detmar W. Staub, Seymour Goodman, and Richard L. Baskerville. Armonk, NY: M. E. Sharpe, 2008. 46-68.
Warkentin, Merrill, Kimberly Davis, and Ernst Bekkering. "Chapter 1.30: Check-Off Password System (COPS): An Advancement in User Authentication Methods and Information Security." Information Security and Ethics: Concepts, Methodologies, Tools and Applications. Ed. Hamid R. Nemati. Hershey, PA: Information Science Reference, 2008. 402-418.
Warkentin, Merrill, Mark B. Schmidt, and Ernst Bekkering. "Chapter VII: Steganography." Cyber Warfare and Cyber Terrorism. Ed. Lech Janczewski and Andrew M. Colarik. Hershey, PA: Information Science Reference, 2008. 50-56.
Warkentin, Merrill, and Allen C. Johnston. "Chapter 4.32: IT Security Governance and Centralized Security Controls." Information Security and Ethics: Concepts, Methodologies, Tools and Applications. Ed. Hamid R. Nemati. Hershey, PA: Information Science Reference, 2008. 2130-2138.
Warkentin, Merrill, Kimberly Davis, and Ernst Bekkering. "Chapter 4.31: A TAM Analysis of an Alternative High-Security User Authentication Procedure." Information Security and Ethics: Concepts, Methodologies, Tools and Applications. Ed. Hamid R. Nemati. Hershey, PA: Information Science Reference, 2008. 2114-2129.
Hightower, Ross, Lutfus Sayeed and Merrill Warkentin. "A Longitudinal Study of Information Exchange in Computer-Mediated and Face-to-Face Groups." Decision Support for Global Enterprises, Annals of Information Systems, Volume 2. Ed. Uday Kulkarni, Daniel J. Power, and Ramesh Sharda. New York: Springer, 2007. 93-112.
Warkentin, Merrill and April M. Adams. "Chapter XIV: A Framework for Evaluating Outsourcing Risk." Outsourcing Management Information Systems. Ed. Marc J. Schniederjans, Ashlyn M. Schniederjans, and Dara G. Schniederjans. Hershey, PA: Idea Group Publishing, 2007. 270-281.
Luo, Xin, and Merrill Warkentin. "Chapter IX: Consumers' Preferences and Attitudes Toward Mobile Office Use: A Technology Trade-Off Research Agenda." E-Business Process Management: Technologies and Solutions. Ed. Jayavel Sounderpandian and Tapan Sinha. Hershey, PA: Idea Group Publishing, 2007. 175-185.
Warkentin, Merrill, Mark B. Schmidt, and Ernst Bekkering. "Chapter XVIII: Steganography and Steganalysis." Enterprise Information Assurance and System Security: Managerial and Technical Issues. Ed. Merrill Warkentin and Rayford Vaughn. Hershey, PA: Idea Group Publishing, 2006. 287-294.
Lee, Cheon-Pyo, and Merrill Warkentin. "Mobile Banking Systems and Technology." Encyclopedia of E-Commerce, E-Government, and Mobile Commerce. Ed. Mehdi Khousrow-Pour. Hershey, PA: Idea Group Publishing, 2006. 754-759.
Gefen, David, Gregory M. Rose, Merrill Warkentin, and Paul A. Pavlou. "Chapter V: Culture and Trust in the Adoption of Electronic Voting: A Look at the USA and South Africa." Advanced Topics in Global Information Management, Volume 5. Ed. M. Gordon Hunter and Felix B. Tan. Hershey, PA: Idea Group Publishing, 2006. 102-127.
Warkentin, Merrill, Robert C. Moore, and Melissa Moore. "Chapter 5: A Synthesis and Analysis of Behavioral and Policy Issues in Electronic Marketing Communication." Contemporary Research in E-Marketing, Volume Two. Ed. Sandeep Krishnamurthy. Hershey, PA: Idea Group Publishing, 2006. 106-118.
Warkentin, Merrill, and Allen C. Johnston. "Chapter II: IT Security Governance and Centralized Security Controls." Enterprise Information Assurance and System Security: Managerial and Technical Issues. Ed. Merrill Warkentin and Rayford Vaughn. Hershey, PA: Idea Group Publishing, 2006. 16-24.
Moore, Robert S., Merrill Warkentin, and Melissa Moore. "Information Integration for Relationship Management." Encyclopedia of E-Commerce, E-Government, and Mobile Commerce. Ed. Mehdi Khosrow-Pour. Hershey, PA: Idea Group Publishing, 2006. 608-614.
Luo, Xin and Merrill Warkentin. "Malware and Anti-Virus Procedures." Encyclopedia of Multimedia Technology and Networking, Volume 2. Ed. Margherita Pagani. Hershey, PA: Idea Group Publishing, 2005. 562-570.
Warkentin, Merrill, Kimberly Davis, and Ernst Bekkering. "Chapter 14: A TAM Analysis of an Alternative High-Security User-Authentication Procedure." Advanced Topics in End User Computing, Volume 4. Ed. Mo Adam Mahmood. Hershey, PA: Idea Group Publishing, 2005. 290-300.
Lueg, Jason E., Robert S. Moore, and Merrill Warkentin. "Chapter VII: Motivation and Search Intensity: An Investigation of Online Consumer Search Behavior." Advanced Topics in End User Computing, Volume 3. Ed. Mo Adam Malmood. Hershey, PA: Idea Group Publishing, 2004. 127-142.
Warkentin, Merrill, and Akhilesh Bajaj. "Chapter XIII: Continuous Demand Chain Management: A Downstream Business Model for E-Commerce." Managing E-Commerce and Mobile Computing Technologies. Ed. Julie Mariga. Hershey, PA: IRM Press, 2003. 163-182.
Warkentin, Merrill, and Akhilesh Bajaj. "Chapter VIII: The On-Demand Delivery Services Model for eCommerce." Managing Business with Electronic Commerce: Issues and Trends. Ed. Aryya Gangopadhyay. Hershey, PA: Idea Group Publishing, 2002. 131-150.
Warkentin, Merrill. "Chapter 13: Dynamic Digital Process Integration in Business-to-Business Networks." Business-to-Business Electronic Commerce: Challenges and Solutions. Ed. Merrill Warkentin. Hershey, PA: Idea Group Publishing, 2002. 261-281.

French, Aaron M. and Merrill Warkentin. "Online Social Networks: Why Privacy is a Thing of the Past." Proceedings of the National Decision Sciences Institute (DSI) 39th Annual Conference, Baltimore, MD, November 22-25, 2008.. Atlanta, GA: Decision Sciences Institute, 2008. 4571-4576.
Lee, Cheon-Pyo, Xin Luo, and Merrill Warkentin. "Perceptions of Security and Privacy When Using Mobile Communication Systems." Proceedings of the National Decision Sciences (DSI) 39th Annual Conference, Baltimore, MD, November 22-25, 2008. Atlanta, GA: Decision Sciences Institute, 2008.
Warkentin, Merrill, Aaron M. French, and Chengqui Guo. "Investigating the Antecedents of E-Commerce Non-Adoption and Rejection: An Empirical Analysis." Proceedings of the National Decision Sciences Institute (DSI) 38th Annual Conference, Phoenix, AZ, November 17-20, 2007. Atlanta, GA: Decision Sciences Institute, 2007.
Yu, Jongtae, and Merrill Warkentin. "A Framework for System Development Outsourcing Management." Proceedings of the National Decision Sciences Institute (DSI) 38th Annual Conference, Phoenix, AZ, November 17-20, 2007. Atlanta, GA: Decision Sciences Institute, 2007.
Warkentin, Merrill, Ernst Bekkering, Allen C. Johnston, and Robert Moore. "Risk Perspectives in Systems Development." Proceedings of the 2007 Americas Conference on Information Systems (AMCIS). Keystone, CO: AMCIS, 2007. Paper 273.
Warkentin, Merrill, Changqi Guo, Xin Luo, and Feifei Xie. "An Assessment of U.S. and Chinese Online Gaming Environments and Futures." Proceedings of the 2007 Americas Conference on Information Systems (AMCIS). Keystone, CO: AMCIS, 2007. Paper 277.
Warkentin, Merrill, Jordan Shropshire, and Allen C. Johnston. "The IT Security Adoption Conundrum: An Initial Step Toward Validation of Applicable Measures." Proceedings of the 2007 American Conference on Information Systems (SMCIS). Keystone, CO: AMCIS, 2007. Paper 276.
Warkentin, Merrill, Robert Moore, Ernst Bekkering, and Allen C. Johnston. "Systems Development Project Risk Perceptions." Proceedings of the National Decision Sciences Institute (DSI) 38th Annual Conference, Phoenix, AZ, November 17-20, 2007. Atlanta, GA: Decision Sciences Institute, 2007.
Warkentin, Merrill, and Allen C. Johnston. "Privacy Policy Compliance: What Motivates Employees?." Presented at the Third Annual Forum on Financial Information Systems and Cybersecurity: A Public Policy Perspective, College Park, Maryland, May 24, 2006. 2006.
Warkentin, Merrill, Jordan Shropshire, and Allen C. Johnston. "Why Do We Check the Box? - A Study of Security Action Automation and Capitulation." Proceedings of the ISOneWorld Security Conference, Las Vegas, NV, April 19-20, 2006. Las Vegas, NV: 2006.
Warkentin, Merrill, Allen C. Johnston, and April M. Adams. "User Interaction with Healthcare Information Systems: Do Healthcare Professionals Want to Comply with HIPAA?." Proceedings of the 2006 Americas Conference on Information Systems (AMCIS). AMCIS, 2006. Paper 326.
Warkentin, Merrill, Jordan Shropshire, and Allen C. Johnston. "Security Software Discontinuance." Proceedings of the 2006 Workshop on Information Security and Assurance (WISA), the SIGSEDC pre-ICIS Workshop, December 10, 2006. Milwaukee, WI: WISA, 2006.
Warkentin, Merrill. "Behavioral Research in Business Research (with a special focus on Information Assurance)." Research Forum Keynote Address, St. Cloud State University, St. Cloud, Minnesota, July 21, 2006. 2006.
Shropshire, Jordan, Merrill Warkentin, Allen C. Johnston, and Mark B. Schmidt. "Personality and IT Security: An Application of the Five-Factor Model." Proceedings of the 2006 Americas Conference on Information Systems (AMCIS). AMCIS, 2006. Paper 415.
Warkentin, Merrill, Aaron French, and Chengqi Guo. "An Empirical Analysis of Antecedents of E-Commerce Non-Adoption and Rejection." Proceedings of the Fifth Workshop on eBusiness (WEB2006), (pre-ICIS), December 9, 2006. Milwaukee, WI: 2006.
Lee, Cheon-Pyo, Xin Luo, and Merrill Warkentin. "Perceptions of Security and Privacy when using E-Mail and IM: An Analysis of Administrative and Line Staff Congruence." Proceedings of the 2005 International Conference of Enterprise Information Systems (ICEIS), Miami, FL, May 24-28, 2005. Miami, FL: ICEIS, 2005. (accepted but withdrawn).
Luo,, Xin and Merrill Warkentin. "Consumers' Preferences, Attitudes, and Trade-Offs Towards Mobile Office Use: A Conjoint Analysis." Proceedings of the National Decision Sciences Institute (DSI) 36th Annual Conference, San Francisco, CA, November 17-20, 2005. Atlanta, GA: Decision Sciences Institute, 2005. 13961-13966.
Lee, Cheon-Pyo and Merrill Warkentin. "A Conceptual Framework for Diffusion of Emerging Electronic Media within Organizations." Proceedings of the National Decision Sciences Institute (DSI) 36th Annual Conference, San Francisco, CA, November 17-20, 2005. Atlanta, GA: Decision Sciences Institute, 2005. 13221-13226.
Lee, Cheon-Pyo, and Merrill Warkentin. "The Role of Technology Anxiety and Self-Efficacy in Information Technology Training." Proceedings of the Eleventh Americas Conference on Information Systems (AMCIS), August 2005. Omaha, NE: AMCIS, 2005.
Warkentin, Merrill. "Grand Challenges of IS Research." panelist, ISOneWorld Conference, Kevin C. Desouza, panel chair, March 2005. 2005.
Campbell, Natalie, and Merrill Warkentin. "External Funding in IS Research." Annual National Meeting of the Institute for Operations Research and the Management Sciences (INFORMS), San Francisco, November 16, 2005. San Francisco: INFORMS, 2005.
Luo, Xin, Cheon-Pyo Lee, and Merrill Warkentin. "Adoption of Instant Messaging in an Information Security Supervision and Management Environment: An Empirical Study in Workplace Adoption." Proceedings of the 2005 Annual International Conference of the Information Resources Management Association (IRMA), San Diego, CA, May 15-18, 2005. San Diego, CA: IRMA, 2005. 856-858.
Warkentin, Merrill. "IT Governance and Organizational Development for Security Management." Presentation to CS6725 - Information Security Policies and Strategies - graduate seminar course at Georgia Tech University (Seymour Goodman, Professor), February 8, 2005. 2005.
Warkentin, Merrill. "Threats to your IS Security." Presentation to the National Conference of the Association of Information Technology Professionals (AITP), Jackson, MS, September 21, 2004. 2004.
Warkentin, Merrill, Ernst Bekkering, Mark B. Schmidt, and Allen C. Johnston. "Proposed Study of End-User Perceptions Regarding Tablet PCs." Proceedings of the 2004 Information Resources Management Association (IRMA), New Orleans, LA, May 2004. New Orleans, LA: IRMA, 2004.
Warkentin, Merrill, Mark B. Schmidt, Allen C. Johnston, and Matthew Boren. "IS Security Management Framework: A Competitive Life Cycle Perspective." Proceedings of the 2004 Information Resources Management Association (IRMA), New Orleans, LA, May 2004. New Orleans, LA: IRMA, 2004.
Schmidt, Mark B., Ernst Bekkering, and Merrill Warkentin. "On the Illicit Use of Steganography and Its Detection." Proceedings of the 2004 ISOneWorld International Conference, Las Vegas, NV, April 2004. Las Vegas, NV: ISOneWorld, 2004.
Warkentin, Merrill, and Xin Luo. "Perceptions of Wi-Fi Security Requirements: A Stratified View." Proceedings of the National Decision Sciences Institute (DSI) 35th Annual Conference, Boston, MA, November 20-23, 2004. Atlanta, GA: Decision Sciences Institute, 2004.
Bekkering, Ernst, Mark B. Schmidt, Allen Johnston, Merrill Warkentin, and Phillip Nelson. "Empirical Investigation of Attractiveness of Tablet PCs to Mobile Professionals." Proceedings of the National Decision Sciences Institute 35th Annual Conference, Boston, MA, November 20-23, 2004. Atlanta, GA: Decision Sciences Institute, 2004. 3481-3486.
Lee, Cheon-Pyo, Merrill Warkentin, and Haiwook Choi. "The Role of Technological and Social Factors on the Adoption of Mobile Payment Technologies." Proceedings of the Tenth Americas Conference on Information Systems. New York, NY: AMCIS, 2004. Paper 333.
Johnston, Allen C., and Merrill Warkentin. "The Consumer Online Trust Construct: A Web Merchant Practitioner Perspective." Proceedings of the 2004 Southern Association of Information Systems (SAIS), Savannah, GA, February 2004. Savannah, GA: SAIS, 2004.
Luo, Xin, and Merrill Warkentin. "Assessment of Information Security Spending and Costs of Failure." Proceedings of the 2004 ISOneWorld International Conference, Las Vegas, NV, April l2004. Las Vegas, NV: ISOneWorld, 2004.
Rose, Gregory M., Merrill Warkentin, David Gefen, and Paul A. Pavlou. "The Role and System Characteristics of Internet-Voting in a Multi-Cultural, Nascent Democracy." Proceedings of the 11th Annual Cross-Cultural Meeting in Information Systems (ICIS mini-conference), Seattle, WA, December 2003. Seattle, WA: ICIS, 2003.
Johnston, Allen C., and Merrill Warkentin. "An XML-Based Security Protocol for Semi-Autonomous Agents." Proceedings of the 2003 Annual International Conference of the Information Resources Management Association (IRMA), Philadelphia, PA, 2003. Philadelphia, PA: IRMA, 2003. 674-675.
Warkentin, Merrill. "Information Security in the Era of Terrorist Attacks." Panel Discussant at the 2003 Information Resources Management Association (IRMA) International Conference, Philadelphia, PA, May 2003. Philadelphia, PA: IRMA, 2003.
Bekkering, Ernst, Merrill Warkentin, and Kimberly Davis. "A Longitudinal Comparison of Four Password Procedures." Proceedings of the 2003 Hawaii International Conference on Business, Honolulu, HI, June 18-21, 2003. 2003.
Bekkering, Ernst, Merrill Warkentin, and Kimberly Davis. "Towards Powerful, User-Friendly Authentication: The Check-Off Password System (COPS)." Proceedings of the 2003 Annual International Conference of the Information Resources Management Association (IRMA), Philadelphia, PA, May 2003. Philadelphia, PA: IRMA, 2003. 706-708.
Warkentin, Merrill, and Mark B. Schmidt. "Evaluating Executive Perceptions of IS Security Threats and Responses: A Post 9/11 Critique." Proceedings of the 2003 ISOneWorld International Conference, Las Vegas, NV, April 2003. Las Vegas, NV: ISOneWorld, 2003.
Warkentin, Merrill, Ernst Bekkering, and Kimberly Davis. "An Alternative Password Procedure: An Application of TAM." Proceedings of the National Decision Sciences Institute (DSI) 34th Annual Conference, Washington, DC, November 22-25, 2003. Atlanta, GA: Decision Sciences Institute, 2003.
Gefen, David, Merrill Warkentin, Paul A. Pavlou, and Gregory M. Rose. "E-Government Adoption." Proceedings of the 2002 Americas Conference on Information Systems (AMCIS). Dallas, TX: AMCIS, 2002. Paper 83.
Tarasewich, Peter, Robert C. Nickerson, and Merrill Warkentin. "Wireless/Mobile E-Commerce: Technologies, Applications, and Issues." Proceedings of the 2001 Americas Conference on Information Systems. AMCIS, 2001. Paper 87.
Davis, Kimberly, and Merrill Warkentin. "Strategic and Legal Issues in Internet Branding: Selection and Protection of Internet Domain Names." Proceedings of the National Decision Sciences Institute (DSI) 32nd Annual Conference, San Francisco, CA, November 17-20, 2001. Atlanta, GA: Decision Sciences Institute, 2001. 246-248.
Hightower, Ross, Lutfus Sayeed, and Merrill Warkentin. "A Longitudinal Study of Information Exchange in Computer-Mediated and Face-to-Face Groups." Proceedings of the 2001 Annual Conference of the Western Decision Sciences Institute (Winner of the "Best Paper Award" in MIS category). 2001. 548-550.