Joey F. George

Joey F. George
Iowa State University | ISU · Department of Information Systems and Business Analytics

PhD

About

163
Publications
91,164
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
11,397
Citations
Introduction
Joey F. George is Distinguished Professor Emeritus in the College of Business at Iowa State University. His research interests focus on deceptive computer-mediated communication, computer-based monitoring, and group support systems. He is a past president of the Association for Information Systems (AIS), and in 2008, he was selected as a Fellow of AIS. He was awarded the AIS LEO Lifetime Achievement Award in 2014.
Additional affiliations
August 2011 - present
Iowa State University
Position
  • John D. DeVries Endowed Chair in Business
August 1999 - August 2011
Florida State University
Position
  • Professor (Full)
August 1998 - August 1999
Louisiana State University
Position
  • Associate Professor & Schlieder Chair in IS

Publications

Publications (163)
Article
Full-text available
Disinformation–false information intended to cause harm or for profit–is pervasive. While disinformation exists in several domains, one area with great potential for personal harm from disinformation is healthcare. The amount of disinformation about health issues on social media has grown dramatically over the past several years, particularly in re...
Article
With the publication of this article, we are making available the dataset collected for and analyzed in our 2018 MIS Quarterly article “The Effects of Communication Mode and Culture on Deception Detection Accuracy.” Our article examined the relationships between computer-based modes of communication and national culture on deception detection succe...
Article
bold xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">Background: Computer-mediated communication (CMC) is an important part of work life. However, this communication can be dishonest, and when people attempt to judge dishonesty, irrespective of the cues available, they tend to rely on a few nonverbal cues...
Article
Full-text available
Not securing smart home devices has proven threatful to cyberspace. This has underscored the importance of using fear appeals to promote users' information security behavior. We practice context-specific theorization to enhance fear appeal theory and design. Particularly, we extend Protection Motivation Theory to include avoidant-focused motivation...
Article
Seemingly, people have always been curious, and worried about, the future. The future of work is no exception. Today, a key focus of thought about the future is how the development and dissemination of robots and artificial intelligence (AI) will affect work. In the past, the information systems community has made several predictions about computin...
Article
Full-text available
The Internet of Things (IoT) is a widely hyped concept, with its focus on the connection of smart devices to the Internet rather than on people. IoT for consumers is often called the smart home market, and a large part of that market consists of home security devices. Consumers are often motivated to purchase smart home security devices to prevent...
Article
Text messages with strategically placed emoticons impact recipient perceptions regarding truth or deception of the content. This article describes an experiment using 3 treatments applied randomly to 4 deceptive and 4 truthful message snippets. The original content of the snippets related to scholarship interviewee comments that truthfully or decep...
Article
Full-text available
In today’s marketplace, firms participating in a supply chain are required to work collaboratively to quickly respond to market and consumer demands. To understand how firms may effectively achieve supply chain collaboration, this paper presents an empirical study using a moderated mediation model that explores the effects of formal contract, e-bus...
Article
Sustainable behaviors in the sharing economy have attracted attentions from both researchers and practitioners. Prior literature has mostly focused on sustainable development in the traditional economy and treated sustainability as an influential factor of participation in the sharing economy. Based on the self-determination theory and the stimulus...
Article
IT department culture has been widely recognized as an important factor that influences the adoption of agile practices. Yet, the research pertaining to the relationship between IT department culture and agile practices usage remains underexplored. This study proposes and tests the relationships between four competing cultural forms and two types o...
Conference Paper
Full-text available
Temporary and part-time workers constitute an important and increasing segment of the workforce in the United States. In this theoretical paper, we examine the impact of IT-induced employment irregularities and deskilling on physical and mental health and economic well-being of such workers. We draw upon stress process theory, job strain model and...
Article
The application of emerging collaborative digital technologies enhanced firms’ collaborative innovation and firm performance. This paper examines the drivers of collaborative innovation capability, and its effects on the digital collaboration capability. Based on the technology-push and need-pull perspective as well as operational capability hierar...
Article
Purpose This paper investigates the extent to which newly agile organizations followed 2001’s Agile Manifesto, especially in terms of the 12 principles of the agile approach, as included in the Manifesto. Design/methodology/approach The authors conducted in-depth case studies of groups in three large business organizations that had recently adop...
Preprint
BACKGROUND The World Health Organization notes that diabetes, a chronic disease, is a silent epidemic, and by 2020 there will be a 54% rise in the total number of individuals diagnosed with this disease. These are alarming figures that have significant repercussions for the quality of life of individuals and their families as well as for the financ...
Article
As the world“gets smaller” and more people engage in cross-cultural communications, their ability to successfully separate truth from deception can be critically important. Yet it is challenging. While deceptive communication has been studied for decades, some areas are not well understood. In particular, two areas that could benefit from further r...
Article
Personal health record systems are widely available and regarded as a key element in the push for electronic health records and the meaningful use of technology in medicine. However, the adoption and use of these systems has been much lower than anticipated. While research has investigated the reasons for this lack of adoption, we have no satisfact...
Article
The Hawaii International Conference on System Sciences (HICSS) celebrated its 50th anniversary (HICSS-50) in January, 2017. To mark the occasion and to pay respect to the significant standing of this conference in the global IS community, the Communications of the Association for Information Systems (CAIS) organized a special section on “Celebratin...
Article
Full-text available
Deceptive communication is a part of everyday life, regardless of one’s geographical location or method of communication. Very little research has examined the role of espoused cultural values in the preferences that individuals hold when considering to deceive others. These preferences include the relationship and the sex of the target of the dece...
Article
How to create value from information technology (IT) in multi-firm situations has attracted the notice of both researchers and practitioners. However, as a critical factor to enhance relational performance, the inter-firm IT governance strategy has not been sufficiently studied. Based on the contractual and relational governance literature, this pa...
Chapter
The work of virtual teams is increasingly important to today's organizations, work that is accomplished predominantly via computer-mediated communication. The authors investigate the moderating role of experience with instant messaging on the team interpersonal processes (cohesion and openness) to team effectiveness relationship in virtual teams. D...
Article
Deception is a common part of everyday discourse, and while much is known about deception and traditional face-to-face communication, relatively little is known about deception and its detection when the communication is computer-mediated. A recent meta-analysis (Bond & DePaulo, 2008) showed that the largest determinant of deception detection succe...
Research
Full-text available
Information Technology is enabling and facilitating dramatic changes in the region of the United States sometimes called the Heartland. The Midwest United States has always enjoyed an abundant water supply, thanks to the major rivers and lakes in the region. There is also a vast, well-maintained highway system, and in some cases an expanding transp...
Article
The era of big data has begun such that organizations in all industries have been heavily investing in big data initiatives. We know from prior studies that investments alone do not generate competitive advantage; instead, firms need to create capabilities that rival firms find hard to match. Drawing on the resource-based theory of the firm and rec...
Article
While a variety of research studies have examined factors that influence individuals’ attitudes toward and use of websites, an important yet understudied stream looks at the role of website credibility. We examine website credibility through the lens of prominence-interpretation theory. Fogg (2003) developed this theory to help explain the relation...
Article
Full-text available
Deception is a pervasive problem often found in human behavior. This study investigates why past deception studies have found groups perform no better than individuals in detection using time-interaction-performance theory which suggests teams are not immediately effective. Only after establishing relational links is potential reached. Established...
Article
Purpose – Based on the literature of IT strategic alignment and e-collaboration, the purpose of this paper is to specify how e-business strategic alignment (e-alignment) influences e-collaboration capabilities and improves firm performance, and whether the time-lag effect existed in this relationship. Design/methodology/approach – The authors test...
Article
Full-text available
Industry-academic collaboration is a strategic necessity in today's fragmented and turbulent economy. Advisory boards offer an effective way to achieve mutually beneficial and sustained collaboration. This article is based on in-depth case studies and comparisons of four advisory boards in U.S. colleges that offer IS programs. It provides archetype...
Article
In this study, the impacts of IS strategic leadership on organizational outcomes are examined from the perspective of CIO strategic roles. A field survey is conducted to collect data from 110 matched pairs of CIOs and business executives within organizations. Our findings suggest that IS quality significantly mediates the relationship between IS st...
Article
Recent research has demonstrated that the most important determinant of deception detection success was the perceived credibility of the sender. If so, then what accounts for differences in perceived sender credibility, especially when communication is conducted solely via computer-mediated communication modes where sender and receiver cannot see e...
Article
This study explores the nature of information technology adoption based on phenomena found in the real world. We selected the grounded theory method (GTM) for this study, which involved two sites located in the USA. and eight sites located in Taiwan. The results exemplify a multi-year, multi-site grounded theory approach to generating theory that h...
Article
While much is known about selecting different types of control that can be exercised in information systems development projects, the control dynamics associated with ISD offshoring projects represent an important gap in our understanding. In this paper, we develop a substantive grounded theory of control balancing that addresses this theoretical g...
Article
Research problem: Due to globalization and the increased availability of online collaboration tools, individuals are now likely to work together in settings where computers are their primary mode of communication. However, because communication characteristics are different in virtual team settings, especially when they are text based, communicatio...
Article
The purpose of this study was to understand why organizational adoption of virtual worlds much has been much slower than expected, by empirically identifying factors that influence organizational intent to adopt virtual worlds. To do so, we developed a model of factors that influence organizational adoption of virtual worlds, based on the Technolog...
Article
Full-text available
The work of virtual teams is increasingly important to today's organizations, work that is accomplished predominantly via computer-mediated communication. The authors investigate the moderating role of experience with instant messaging on the team interpersonal processes (cohesion and openness) to team effectiveness relationship in virtual teams. D...
Article
In today’s business environment, deception is commonplace. In hiring situations, successful deception by job candidates can lead to a poor fit between the candidate’s abilities and the requirements of the job, and this can lead to poor performance. This study seeks to inhibit successful deception by job candidates by suggesting that managers limit...
Article
The purpose of this study was to explore the incidence and potential influence of deceptive communication on the decisions made by groups using computer-mediated communication. Two dependent variables were of specific interest—the amount of deception submitted during group decision-making and the success of deceivers in influencing the final decisi...
Article
This paper investigates two actors in IT recruitment: IT job seekers and IT employers. Signaling theory and image theory inform this research. Signaling theory suggests that there are unique groups of IT job seekers and IT employers. Image theory explains the implications of groups of IT job seekers' have images of firms. Based on a closet qualitat...
Article
Many senior portals are expected to appear as the elderly population and the number of aged Internet users continues to increase. This study defines a senior portal as an Internet portal that is specific to seniors. The purpose of the study is to investigate what kind of content of senior portals is preferred by prospective users of senior portals,...
Article
Being able to detect deceptive information early is worthwhile for recruiters and other information-based organizational workers; unfortunately, people generally are not good at detecting deception successfully. We conducted an experiment to determine how successful reviewers can be at detecting deception in several types of dispersed interviews. T...
Conference Paper
Full-text available
As individuals become more experienced with information technologies (ITs), they become limited by well-learned behavioral routines for using an IT, which act to inhibit innovation. This "paradox of the active user" can prove problematic for organizations, which derive benefits when organizational ITs are used to their fullest potential. Thus, to a...
Conference Paper
Electronic Health Record (EHR) systems represent an opportunity to improve the delivery of health care. However, low implementation rates inhibit the ability of EHR to fulfill the promise of the information systems. One possible reason why implementation rates remain low is the high degree of customization required by clinical workers to fit the in...
Article
Full-text available
We examine the perspective held by individuals concerning available media characteristics when presented with a directive to lie. A total of 532 management professionals were placed into one of four survey-based scenarios in which they were asked to select a medium for use in a well-defined deceptive task. The scenarios manipulated the familiarity...
Article
This research examines the impact of computer-mediated communication, distributed communication, and knowledge of prior baseline behavior on an individual’s propensity to make veracity judgments. This study found that more detection confidence can come from knowledge of a person’s prior baseline behavior, being proximally located, the type of c...
Chapter
This research examines the impact of computer-mediated communication, distributed communication, and knowledge of prior baseline behavior on an individual’s propensity to make veracity judgments. Subjects were motivated to detect deception by participating in a Prisoner’s Dilemma game with monetary rewards. Methodologies of other deception detectio...
Conference Paper
Full-text available
In today's business environment, deception is commonplace. In hiring situations, successful deception by job candidates can lead to a poor fit between the candidate's abilities and the requirements of the job, and this can lead to poor performance. This study seeks to inhibit successful deception by job candidates by suggesting that managers limit...
Conference Paper
Full-text available
Although much research into deceptive communication has been conducted in the last several years, little of it has focused on deception outside of a North American context. Similarly, most deceptive research has investigated face-to-face verbal communication and neglected computer-mediated communication modes. This paper describes a study in progre...
Chapter
This research examines the impact of computermediated communication, distributed communication, and knowledge of prior baseline behavior on an individual’s propensity to make veracity judgments. This study found that more detection confidence can come from knowledge of a person’s prior baseline behavior, being proximally located, the type of commun...
Article
How common is deception in everyday communication, and what is the relationship between deception and media? This paper provides findings from two diary-based studies of deceptive communication using five different media, designed to help answer these questions. The findings show that 1) deception is common in every communication, accounting for 22...
Article
Full-text available
Many of the ideas we take for granted about group support systems originated from work conducted at the University of Minnesota by DeSanctis and colleagues. One of the lesser known concepts is an analysis of the theoretical basis for group support system research. This analysis groups five theories that support GSS research into two camps: individu...
Article
Deception research has been primarily studied from a Western perspective, so very little is known regarding how other cultures view deception. Cross-cultural deception research is important due to the escalation of cross-cultural communication. Therefore, this study proposes a framework for understanding the role Korean and American culture plays i...
Article
This research examines the impact of computer-mediated communication, distributed communication, and knowledge of prior baseline behavior on an individual's propensity to make veracity judgments. This study found that more detection confidence can come from knowledge of a person's prior baseline behavior being proximally located, the type of commun...
Article
Full-text available
CIOs and IT managers need to mitigate the risks to information and IT assets arising from deception-based attacks. Common examples of deception are "social engineering" and phishing, both aimed at getting people to divulge information that will enable unauthorized access to computer systems. One well-known hacker has claimed it is easier to ask peo...
Article
Full-text available
Purpose This study aims to examine how two types of trust affect five key franchisee attitudes/behaviors within a setting where franchisees have strong contractual ties to the franchisor. The five attitudes/behaviors are: identification and satisfaction with the franchisor, compliance and non‐compliance with franchisor directives, and perceived rel...
Article
This study on computer-mediated deception features an experiment involving an interactive interview of deceitful applicants for a fictitious scholarship, using one of three different computer-based communication media. Results showed that people were successful at deceiving others no matter what medium was used, but interviewers who used interactiv...
Conference Paper
Deception in résumés and job applications is common, and being able to detect deceptive information early is worthwhile for many recruiters. Yet recent studies have revealed that people are not very good at detecting deception successfully, particularly when they are communicating using computer-based communication, with which more and more intervi...
Chapter
Organizational decision support systems (ODSS) have been defined as computer-based systems that focus on organizational tasks affecting several organizational units, functions, and/or hierarchical layers. The nature of these systems is explored here through reviewing definitions and information technology requirements of ODSS as well as description...
Article
Full-text available
This article reports on an experiment investigating the differences between computer-mediated and face-to-face negotiations and between negotiators being deceptive about hidden agendas and negotiators without hidden agendas. Our results supported the hypotheses that individuals negotiating via instant messaging are more likely to use forcing negoti...
Article
Much research within the field of MIS has been devoted to the use of collaborative technology by decision makers and the impact computer-mediated communication (CMC) has on collaborative work. Yet, there may be some unintended consequences for users of CMC, if someone involved in the joint effort decides to take the opportunity to deceive the other...
Conference Paper
Small group research and the development of small group theory have flourished in recent years, yet most group support systems (GSS) research is conducted without regard to theories of small groups. Here we contrast the richness of small group theory with the theoretical poverty of most experimental group support systems research. We look first at...
Article
Full-text available
This 5-year project conducted principally by University of Arizona, Florida State University, Michigan State University, and Air Force Institute of Technology, reports results of (1) theoretical development on a model of interactive deception, (2) laboratory and field testing to identify reliable indicators of deceit and variables that moderate tho...
Article
Full-text available
This study examines the antecedents of turnover intention among information technology road warriors. Road warriors are IT professionals who spend most of their workweek away from home at a client site. Building on Moore’s (2000) work on turnover intention, this article develops and tests a model that is context-specific to the road warrior situati...
Article
This article reports on an experiment investigating the differences between computer-mediated and face-to-face negotiations and between negotiators being deceptive about hidden agendas and negotiators without hidden agendas. Our results supported the hypotheses that individuals negotiating via instant messaging are more likely to use forcing negoti...
Article
Much research within the field of MIS has been devoted to the use of collaborative technology by decision makers and the impact computer-mediated communication (CMC) has on collaborative work. Yet, there may be some unintended consequences for users of CMC, if someone involved in the joint effort decides to take the opportunity to deceive the other...
Conference Paper
Business organizations emphasize the importance of teamwork and collaboration within work groups more than ever before. Unfortunately, group interaction is not always positive. Very little research has been conducted to investigate the behavior and judgments of group members who are belong to group in which one of the members is deceptive. This stu...
Conference Paper
Full-text available
Deception and deception detection have become important research areas in business. However, little deception research has looked at the computer-mediated group settings that many organizational decisions are made in today. Further, past research has not looked at the influence of task complexity, a key part of group decision processes, on deceptio...
Conference Paper
Studies have shown that deception in the hiring process is common. Since more people are using computer mediated communication for job interviewing, it is important to understand how those modes of communication affect deception and its detection. Differences in gender may affect the communication process. Very little research has been conducted on...
Conference Paper
Managing IS security risks is a top concern for business organizations because of the significant negative impact of IS security breaches. Spending on IS security is expected to exceed $30 billion this year, yet in spite of these investments losses in excess of $15 billion are anticipated to occur because of security breaches. Current IS security r...
Conference Paper
Full-text available
What media do deceivers choose for their deceptions and why do they choose them? Few past studies of media selection have investigated media choice for deception. Media richness theory predicts that the most common media choice for deception would be face-to-face, while Hancock et al’s three-factor model predicts that phone would be the dominant ch...
Conference Paper
Full-text available
The idea of anywhere and anytime learning is enticing. Electronic-based learning is seen as an answer to this requirement. Currently there are many variations in electronic-based instructional media, and there is little research to determine which format or combination of formats is most conducive to facilitating knowledge transfer and learning. Th...
Article
Winning customer loyalty is viewed as a priority by many electronic (e) businesses. Grounded in the theory of reasoned action, our proposed model suggests that commitment is a key attitudinal antecedent to Web shopper loyalty. In the model, we introduce trust in the Internet and social involvement in a Web consumption community as moderators of the...
Article
Full-text available
Several opinion polls have found that many consumers resist making purchases via the Internet because of their concerns about the privacy of the personal information they provide to Internet merchants. Using the theory of planned behavior as its basis, this study investigated the relationships among beliefs about Internet privacy and trustworthines...
Article
Full-text available
We investigate the role that media synchronicity and media richness play in the particular communication context of deception. Hypotheses are developed based on prior models of mediated-deception as well as media richness theory and channel expansion theory. Two survey-based studies were conducted to look at this construct from the separate standpo...
Conference Paper
Full-text available
With an increasing amount of business-related tasks and decisions being supported by communication technology, it is important to understand and explore the vulnerabilities that may result from its use. One of these weaknesses is the transmission of deceptive information. Very little research investigating mediated deception and its detection exist...
Conference Paper
Full-text available
Computer-mediated communication is becoming ubiquitous in our networked society. Yet one aspect of human communication that is rarely explored in the context of computer-mediated communication is deception. Deception is common, yet communication research has shown that people perform little better than chance at successfully detecting it. Two diffe...
Conference Paper
Full-text available
Humans are not very good at detecting deception in normal communication. One possible remedy for improving detection accuracy is to educate people about various indicators of deception and then train them to spot these indicators when they are used in normal communication. This paper reports on one such training effort involving over 100 military o...
Article
Much if not all of the literature on interpersonal communication and deception has focused on the interaction between two people, with one person attempting to deceive the other. This paper seeks to extend the prior literature by presenting some initial thoughts on deceptive communication when there is one deceiver and multiple receivers. Viewing d...
Article
Full-text available
An integrated model of interpersonal deception, focusing on the particular characteristics and impacts of computer-mediated modalities, is derived and presented. Although there is a wealth of research investigating both mediated communication and deception, there has been relatively little empirical work at the intersection. Our purpose is to provi...
Article
Full-text available
The information systems academic discipline has faced a sharp reduction in student enrollments as the job market for undergraduate students has softened. This essay examines the recent and rapid rise and fall of university student enrollments in information systems programs and describes how these enrollment fluctuations are tied to the job opportu...
Conference Paper
Full-text available
Humans are not very good at detecting deception in normal communication. One possible remedy for improving detection accuracy is to educate people about various indicators of deception and then train them to spot these indicators when they are used in normal communication. This paper reports on one such training effort involving over 100 military o...
Article
Discusses improvement of software inspections with group process support. Planning and follow-up; Stages of software inspection process; Perceiving potential sources of losses and gain. INSET: How the Study was Done.

Network

Cited By