Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ryan T. Wright is active.

Publication


Featured researches published by Ryan T. Wright.


Journal of Management Information Systems | 2010

The Influence of Experiential and Dispositional Factors in Phishing: An Empirical Investigation of the Deceived

Ryan T. Wright; Kent Marett

Phishing has been a major problem for information systems managers and users for several years now. In 2008, it was estimated that phishing resulted in close to


Journal of Management Information Systems | 2017

Training to Mitigate Phishing Attacks Using Mindfulness Techniques

Matthew L. Jensen; Michael Dinger; Ryan T. Wright; Jason Bennett Thatcher

50 billion in damages to U.S. consumers and businesses. Even so, research has yet to explore many of the reasons why Internet users continue to be exploited. The goal of this paper is to better understand the behavioral factors that may increase ones susceptibility for complying with a phishers request for personal information. Using past research on deception detection, a research model was developed to help explain compliant phishing responses. The model was tested using a field study in which each participant received a phishing e-mail asking for sensitive information. It was found that four behavioral factors were influential as to whether the phishing e-mails were answered with sensitive information. The paper concludes by suggesting that the behavioral aspect of susceptible users be integrated into the current tools and materials used in antiphishing efforts.


hawaii international conference on system sciences | 2017

Combating Phishing Attacks: A Knowledge Management Approach

Matthew L. Jensen; Alexandra Durcikova; Ryan T. Wright

Abstract Phishing attacks are at a record high and are causing billions of dollars in losses. To mitigate phishing’s impact, organizations often use rule-based training to teach individuals to identify certain cues or apply a set of rules to avoid phishing attacks. The rule-based approach has improved organizational defenses against phishing; however, regular repetition of rule-based training may not yield increasing resistance to attacks. To expand the toolkit available to combat phishing attacks, we used mindfulness theory to develop a novel training approach that can be performed after individuals are familiar with rule-based training. The mindfulness approach teaches individuals to dynamically allocate attention during message evaluation, increase awareness of context, and forestall judgment of suspicious messages—techniques that are critical to detecting phishing attacks in organizational settings, but are unaddressed in rule-based instruction. To evaluate the efficacy of our approach, we compared rule-based and mindfulness training programs in a field study at a U.S. university that involved 355 students, faculty, and staff who were familiar with phishing attacks and received regular rule-based guidance. To evaluate the robustness of the training, we delivered each program in text-only or text-plus-graphics formats. Ten days later, we conducted a phishing attack on participants that used both generic and customized phishing messages. We found that participants who received mindfulness training were better able to avoid the phishing attack. In particular, improvement was observed for participants who were already confident in their detection ability and those who reported low e-mail mindfulness and low perceptions of Internet risk. This work introduces and provides evidence supporting a new approach that may be used to develop anti-phishing training.


hawaii international conference on system sciences | 2012

Introduction to Human-Computer Interaction (HCI) Minitrack

Joseph S. Valacich; Ryan T. Wright; Angelika Dimoka

This paper explores how an organization can utilize its employees to combat phishing attacks collectively through coordinating their activities to create a human firewall. We utilize knowledge management research on knowledge sharing to guide the design of an experiment that explores a central reporting and dissemination platform for phishing attacks. The 2x2 experiment tests the effects of public attribution (to the first person reporting a phishing message) and validation (by the security team) of phishing messages on reporting motivation and accuracy. Results demonstrate that knowledge management techniques are transferable to organizational security and that knowledge management can benefit from insights gained from combating phishing. Specifically, we highlight the need to both publicly acknowledge the contribution to a knowledge management system and provide validation of the contribution. As we saw in our experiment, doing only one or the other does not improve outcomes for correct phishing reports (hits).


Communications of The Ais | 2010

Curriculum Guidelines for Undergraduate Degree Programs in Information Systems

Heikki Topi; Kate M. Kaiser; Janice C. Sipior; Joseph S. Valacich; Jay F. Nunamaker; G.-J. de Vreede; Ryan T. Wright

The Human-Computer Interaction (HCI) minitrack provides a forum for HCI researchers to exchange a broad and comprehensive range of issues related to the design, development, and assessment of humancomputer interaction. Papers selected for the HCI minitrack draw on a broad range of research methodologies including developmental, conceptualization, theorization, and experimentation to name a few. Given the fast pace of change within the HCI arena (e.g., new applications, new types of users, new types of devices, and so on), it is our hope that the papers presented in this minitrack will prove interesting and relevant to both the academic and practitioner communities.


Communications of The Ais | 2012

Operationalizing Multidimensional Constructs in Structural Equation Modeling: Recommendations for IS Research

Ryan T. Wright; Damon E. Campbell; Jason Bennett Thatcher; Nicholas Roberts


Communications of The Ais | 2010

IS 2010 Curriculum Guidelines for Undergraduate Degree Programs in Information Systems Association for Computing Machinery (ACM) Association for Information Systems (AIS)

Heikki Topi; Joseph S. Valacich; Ryan T. Wright; Kate M. Kaiser; Jay F. Nunamaker; Jr . Janice; G.-J. de Vreede


Communications of The Ais | 2007

Revising the IS Model Curriculum: Rethinking the Approach and the Process

Heikki Topi; Joseph S. Valacich; Kate M. Kaiser; Jay F. Nunamaker; Janice C. Sipior; Gert-Jan de Vreede; Ryan T. Wright


Group Decision and Negotiation | 2010

Where Did They Go Right? Understanding the Deception in Phishing Communications

Ryan T. Wright; Suranjan Chakraborty; Asli Basoglu; Kent Marett


international conference on information systems | 2010

Validating Work System Principles for Use in Systems Analysis and Design

Steven Alter; Ryan T. Wright

Collaboration


Dive into the Ryan T. Wright's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Kent Marett

Mississippi State University

View shared research outputs
Top Co-Authors

Avatar

Gert-Jan de Vreede

University of Nebraska Omaha

View shared research outputs
Top Co-Authors

Avatar

Asli Basoglu

Washington State University

View shared research outputs
Top Co-Authors

Avatar

G.-J. de Vreede

University of Nebraska Omaha

View shared research outputs
Researchain Logo
Decentralizing Knowledge