{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T21:12:43Z","timestamp":1760044363518,"version":"3.41.2"},"reference-count":41,"publisher":"Emerald","issue":"1","license":[{"start":{"date-parts":[[2015,3,9]],"date-time":"2015-03-09T00:00:00Z","timestamp":1425859200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,3,9]]},"abstract":"<jats:sec>\n               <jats:title content-type=\"abstract-heading\">Purpose<\/jats:title>\n               <jats:p> \u2013 An increasing amount of attention is being paid to the human side of information security programs, leading to research designs that require the manipulation of study variables. The purpose of this paper is to highlight a traditional assessment of such designs, the manipulation check, and examine how its absence can undermine otherwise solid research efforts. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Design\/methodology\/approach<\/jats:title>\n               <jats:p> \u2013 This paper reviews literature from the fields of research methods, organizational behavior and information systems for extant perspectives and viewpoints on manipulation checks, which are then brought into the realm of information security research. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Findings<\/jats:title>\n               <jats:p> \u2013 The possible risks involved with failing to perform manipulation checks are discussed, which include a possibility of making Type II errors. The paper provides further insight on the timing, method and manner in which manipulation checks can be performed. <\/jats:p>\n            <\/jats:sec>\n            <jats:sec>\n               <jats:title content-type=\"abstract-heading\">Originality\/value<\/jats:title>\n               <jats:p> \u2013 A disappointing number of research articles in the area of information security fail to report manipulation checks when they should. This paper seeks to remind researchers to perform this vital assessment and to use the results accordingly.<\/jats:p>\n            <\/jats:sec>","DOI":"10.1108\/ics-12-2013-0087","type":"journal-article","created":{"date-parts":[[2015,2,26]],"date-time":"2015-02-26T06:35:30Z","timestamp":1424932530000},"page":"20-30","source":"Crossref","is-referenced-by-count":8,"title":["Checking the manipulation checks in information security research"],"prefix":"10.1108","volume":"23","author":[{"given":"Kent","family":"Marett","sequence":"first","affiliation":[]}],"member":"140","reference":[{"key":"key2020122521285463100_b1","doi-asserted-by":"crossref","unstructured":"Anderson, C.\n                and \n                  Agarwal, R.\n                (2010), \u201cPracticing safe computing: a multimedia empirical examination of home computer user security behavioral intentions\u201d, \n                  MIS Quarterly\n               , Vol. 34 No. 3, pp. 613-643.","DOI":"10.2307\/25750694"},{"key":"key2020122521285463100_b2","doi-asserted-by":"crossref","unstructured":"Bagozzi, R.\n                (1977), \u201cStructural equation models in experimental research\u201d, \n                  Journal of Marketing Research\n               , Vol. 14 No. 2, pp. 209-226.","DOI":"10.1177\/002224377701400209"},{"key":"key2020122521285463100_b3","doi-asserted-by":"crossref","unstructured":"Batista-Foguet, J.\n               , \n                  Saris, W.\n                and \n                  Tort-Martorell, X.\n                (1990), \u201cDesign of experimental studies for measurement and evaluation of the determinants of job satisfaction\u201d, \n                  Social Indicators Research\n               , Vol. 22 No. 1, pp. 49-67.","DOI":"10.1007\/BF00286390"},{"key":"key2020122521285463100_b5","unstructured":"Boudreau, M.-C.\n               , \n                  Ariyachandra, T.\n               , \n                  Gefen, D.\n                and \n                  Straub, D.\n                (2004), \u201cValidating is positivist instrumentation: 1997-2001\u201d, in \n                  Whitman, M.E.\n                and \n                  Woszczynski, A.B.\n                (Eds), \n                  The Handbook of Information Systems Research\n               , Idea Group Publishing, Hershey, PA."},{"key":"key2020122521285463100_b4","doi-asserted-by":"crossref","unstructured":"Boudreau, M.-C.\n               , \n                  Gefen, D.\n                and \n                  Straub, D.\n                (2001), \u201cValidation in information systems research: a state-of-the-art assessment\u201d, \n                  MIS Quarterly\n               , Vol. 25 No. 1, pp. 1-16.","DOI":"10.2307\/3250956"},{"key":"key2020122521285463100_b6","doi-asserted-by":"crossref","unstructured":"Chang, C.-C.\n                (2006), \u201cWhen service fails: the role of the salesperson and the customer\u201d, \n                  Psychology & Marketing\n               , Vol. 23 No. 3, pp. 203-224.","DOI":"10.1002\/mar.20096"},{"key":"key2020122521285463100_b7","doi-asserted-by":"crossref","unstructured":"Chen, Y.\n               , \n                  Ramamurthy, K.\n                and \n                  Wen, K.-W.\n                (2012), \u201cOrganizations\u2019 information security policy compliance: stick or carrot approach?\u201d, \n                  Journal of Management Information Systems\n               , Vol. 29 No. 3, pp. 157-188.","DOI":"10.2753\/MIS0742-1222290305"},{"key":"key2020122521285463100_b8","unstructured":"Cook, T.D.\n                and \n                  Campbell, D.T.\n                (1979), \n                  Quasi-Experimentation: Design and Analysis Issues for Field Settings\n               , Rand McNally, Chicago, IL."},{"key":"key2020122521285463100_b9","doi-asserted-by":"crossref","unstructured":"Cornelissen, G.\n               , \n                  Cojuharenco, I.\n                and \n                  Karelaia, N.\n                (2011), \u201cOne person in the battlefield is not a warrior: self-construal, perceived ability to make a difference, and socially responsible behavior\u201d, DEE Working Paper No. 1292, Universitat Pompeu Fabra, Barcelona.","DOI":"10.2139\/ssrn.1959965"},{"key":"key2020122521285463100_b10","doi-asserted-by":"crossref","unstructured":"D\u2019Arcy, J.\n               , \n                  Hovav, A.\n                and \n                  Galletta, D.\n                (2009), \u201cUser awareness of security countermeasures and its impact on information systems misuse: a deterrence approach\u201d, \n                  Information Systems Research\n               , Vol. 20 No. 1, pp. 79-98.","DOI":"10.1287\/isre.1070.0160"},{"key":"key2020122521285463100_b11","doi-asserted-by":"crossref","unstructured":"Darley, W.\n                and \n                  Lim, J.-S.\n                (1993), \u201cAssessing demand artifacts in consumer research: an alternative perspective\u201d, \n                  Journal of Consumer Research\n               , Vol. 20 No. 3, pp. 489-495.","DOI":"10.1086\/209364"},{"key":"key2020122521285463100_b12","doi-asserted-by":"crossref","unstructured":"Dennis, A.\n                and \n                  Valacich, J.\n                (2001), \u201cConducting research in information systems\u201d, \n                  Communications of the AIS\n               , Vol. 7 article 5.","DOI":"10.17705\/1CAIS.00705"},{"key":"key2020122521285463100_b13","doi-asserted-by":"crossref","unstructured":"Dinev, T.\n                and \n                  Hu, Q.\n                (2007), \u201cThe centrality of awareness in the formation of user behavioral intention toward protective information technologies\u201d, \n                  Journal of the Association for Information Systems\n               , Vol. 8 No. 7.","DOI":"10.17705\/1jais.00133"},{"key":"key2020122521285463100_b14","doi-asserted-by":"crossref","unstructured":"Highhouse, S.\n                (2009), \u201cDesigning experiments that generalize\u201d, \n                  Organizational Research Methods\n               , Vol. 12 No. 3, pp. 554-566.","DOI":"10.1177\/1094428107300396"},{"key":"key2020122521285463100_b15","doi-asserted-by":"crossref","unstructured":"Jarvenpaa, S.\n               , \n                  Dickson, G.\n                and \n                  Desanctis, G.\n                (1985), \u201cMethodological issues in experimental is research: experiences and recommendations\u201d, \n                  MIS Quarterly\n               , Vol. 9 No. 2, pp. 141-156.","DOI":"10.2307\/249115"},{"key":"key2020122521285463100_b16","doi-asserted-by":"crossref","unstructured":"Jasso, G.\n                (2006), \u201cFactorial survey methods for studying beliefs and judgments\u201d, \n                  Sociological Methods & Research\n               , Vol. 34 No. 3, pp. 34-423.","DOI":"10.1177\/0049124105283121"},{"key":"key2020122521285463100_b17","doi-asserted-by":"crossref","unstructured":"Johnston, A.\n                and \n                  Warkentin, M.\n                (2010), \u201cFear appeals and information security behaviors: an empirical study\u201d, \n                  MIS Quarterly\n               , Vol. 34 No. 3, pp. 549-566.","DOI":"10.2307\/25750691"},{"key":"key2020122521285463100_b18","doi-asserted-by":"crossref","unstructured":"Khan, J.\n                (2011), \u201cValidation in marketing experiments revisited\u201d, \n                  Journal of Business Research\n               , Vol. 64 No. 7, pp. 687-692.","DOI":"10.1016\/j.jbusres.2010.08.009"},{"key":"key2020122521285463100_b19","unstructured":"Kidd, R.\n                (1976), \u201cManipulation checks: advantage or disadvantage?\u201d, \n                  Representative Research in Social Psychology\n               , Vol. 7 No. 2, pp. 160-165."},{"key":"key2020122521285463100_b20","doi-asserted-by":"crossref","unstructured":"Krueger, J.\n                (2001), \u201cNull hypothesis significance testing\u201d, \n                  American Psychologist\n               , Vol. 56 No. 1, pp. 16-26.","DOI":"10.1037\/0003-066X.56.1.16"},{"key":"key2020122521285463100_b21","doi-asserted-by":"crossref","unstructured":"Mackenzie, S.\n                (2001), \u201cOpportunities for improving consumer research through latent variable structural equation modeling\u201d, \n                  Journal of Consumer Research\n               , Vol. 28 No. 1, pp. 159-166.","DOI":"10.1086\/321954"},{"key":"key2020122521285463100_b22","unstructured":"Mitchell, M.\n                and \n                  Jolley, J.\n                (2010), \n                  Research Design Explained\n               , Wadsworth\/Cengage Learning, Belmont, CA."},{"key":"key2020122521285463100_b23","doi-asserted-by":"crossref","unstructured":"O\u2019Keefe, D.\n                (2003), \u201cMessage properties, mediating states, and manipulation checks: claims, evidence, and data analysis in experimental persuasive message effects research\u201d, \n                  Communication Theory\n               , Vol. 13 No. 3, pp. 251-274.","DOI":"10.1111\/j.1468-2885.2003.tb00292.x"},{"key":"key2020122521285463100_b24","doi-asserted-by":"crossref","unstructured":"Oppenheimer, D.M.\n               , \n                  Meyvis, T.\n                and \n                  Davidenko, N.\n                (2009), \u201cInstructional manipulation checks: detecting satisfying to increase statistical power\u201d, \n                  Journal of Experimental Social Psychology\n               , Vol. 45 No. 4, pp. 867-872.","DOI":"10.1016\/j.jesp.2009.03.009"},{"key":"key2020122521285463100_b25","doi-asserted-by":"crossref","unstructured":"Parboteeah, V.\n               , \n                  Valacich, J.\n                and \n                  Wells, J.\n                (2009), \u201cThe influence of website characteristics on a consumer\u2019s urge to buy impulsively\u201d, \n                  Information Systems Research\n               , Vol. 20 No. 1, pp. 60-78.","DOI":"10.1287\/isre.1070.0157"},{"key":"key2020122521285463100_b26","doi-asserted-by":"crossref","unstructured":"Perdue, B.\n                and \n                  Summers, J.\n                (1986), \u201cChecking the success of manipulations in marketing experiments\u201d, \n                  Journal of Marketing Research\n               , Vol. 23 No. 4, pp. 317-326.","DOI":"10.1177\/002224378602300401"},{"key":"key2020122521285463100_b27","doi-asserted-by":"crossref","unstructured":"Prentice, D.\n                and \n                  Miller, D.\n                (1992), \u201cWhen small effects are impressive\u201d, \n                  Psychological Bulletin\n               , Vol. 112 No. 1, pp. 160-164.","DOI":"10.1037\/0033-2909.112.1.160"},{"key":"key2020122521285463100_b28","doi-asserted-by":"crossref","unstructured":"Richins, M.\n                and \n                  Bloch, P.\n                (1986), \u201cAfter the new wears off: the temporal context of product involvement\u201d, \n                  Journal of Consumer Research\n               , Vol. 13 No. 2, pp. 280-285.","DOI":"10.1086\/209067"},{"key":"key2020122521285463100_b29","unstructured":"Rossi, P.H.\n                and \n                  Anderson, A.B.\n                (1982), \u201cThe factorial survey approach: an introduction\u201d, in \n                  Rossi, P.H.\n                and \n                  Nock, S.L.\n                (Eds), \n                  Measuring Social Judgments: The Factorial Survey Approach\n               , Sage Publications, Beverly Hills, CA."},{"key":"key2020122521285463100_b30","doi-asserted-by":"crossref","unstructured":"Saunders, C.\n               , \n                  Rutkowski, A.\n               , \n                  Van Genuchten, M.\n               , \n                  Vogel, D.\n                and \n                  Orrego, J.M.\n                (2011), \u201cVirtual space and place: theory and test\u201d, \n                  MIS Quarterly\n               , Vol. 35 No. 4, pp. 1079-1098.","DOI":"10.2307\/41409974"},{"key":"key2020122521285463100_b31","doi-asserted-by":"crossref","unstructured":"Sawyer, A.\n               , \n                  Lynch, J.\n                and \n                  Brinberg, D.\n                (1995), \u201cA Bayesian analysis of the information value of manipulation and confounding checks in theory tests\u201d, \n                  Journal of Consumer Research\n               , Vol. 21 No. 4, pp. 581-595.","DOI":"10.1086\/209420"},{"key":"key2020122521285463100_b32","doi-asserted-by":"crossref","unstructured":"Sigall, H.\n                and \n                  Mills, J.\n                (1998), \u201cMeasures of independent variables and mediators are useful in social psychology experiments: but are they necessary?\u201d, \n                  Personality and Social Psychology Review\n               , Vol. 2 No. 3, pp. 218-226.","DOI":"10.1207\/s15327957pspr0203_5"},{"key":"key2020122521285463100_b33","doi-asserted-by":"crossref","unstructured":"Siponen, M.\n                (2000), \u201cA conceptual foundation for organizational information security awareness\u201d, \n                  Information Management & Computer Security\n               , Vol. 8 No. 1, pp. 31-41.","DOI":"10.1108\/09685220010371394"},{"key":"key2020122521285463100_b34","doi-asserted-by":"crossref","unstructured":"Siponen, M.\n                and \n                  Vance, A.\n                (2010), \u201cNeutralization: new insights into the problem of employee information systems security policy violations\u201d, \n                  MIS Quarterly\n               , Vol. 34 No. 3, pp. 487-502.","DOI":"10.2307\/25750688"},{"key":"key2020122521285463100_b35","doi-asserted-by":"crossref","unstructured":"Smith, H.J.\n               , \n                  Keil, M.\n                and \n                  Depledge, G.\n                (2001), \u201cKeeping mum as the project goes under: toward an explanatory model\u201d, \n                  Journal of Management Information Systems\n               , Vol. 18 No. 2, pp. 189-227.","DOI":"10.1080\/07421222.2001.11045677"},{"key":"key2020122521285463100_b36","doi-asserted-by":"crossref","unstructured":"Sternthal, B.\n               , \n                  Tybout, A.\n                and \n                  Calder, B.\n                (1987), \u201cConfirmatory versus comparative approaches to judging theory tests\u201d, \n                  Journal of Consumer Research\n               , Vol. 14 No. 1, pp. 114-125.","DOI":"10.1086\/209097"},{"key":"key2020122521285463100_b37","unstructured":"Straub, D.\n               , \n                  Boudreau, M.-C.\n                and \n                  Gefen, D.\n                (2007), \u201cValidation guidelines for IS positivist research\u201d, \n                  Communications of the AIS\n               , Vol. 13 No. 24, pp. 380-427."},{"key":"key2020122521285463100_b38","doi-asserted-by":"crossref","unstructured":"Sussman, A.\n                and \n                  Alter, A.\n                (2012), \u201cThe exception is the rule: underestimating and overspending on exceptional expenses\u201d, \n                  Journal of Consumer Research\n               , Vol. 39 No. 4, pp. 800-814.","DOI":"10.1086\/665833"},{"key":"key2020122521285463100_b39","unstructured":"Wallander, L.\n                (2008), \u201cMeasuring professional judgements: an application of the factorial survey approach to the field of social work\u201d, PhD dissertation, University of Stockholm, Stockholm."},{"key":"key2020122521285463100_b40","doi-asserted-by":"crossref","unstructured":"Wallander, L.\n                (2009), \u201c25 years of factorial surveys in sociology: a review\u201d, \n                  Social Science Research\n               , Vol. 38 No. 3, pp. 505-520.","DOI":"10.1016\/j.ssresearch.2009.03.004"},{"key":"key2020122521285463100_b41","doi-asserted-by":"crossref","unstructured":"Wason, K.\n               , \n                  Polonsky, M.\n                and \n                  Hyman, M.\n                (2003), \u201cDesigning vignette studies in marketing\u201d, \n                  Australasian Marketing Journal\n               , Vol. 10 No. 3, pp. 41-58.","DOI":"10.1016\/S1441-3582(02)70157-2"}],"container-title":["Information &amp; Computer Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/ICS-12-2013-0087","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-12-2013-0087\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/ICS-12-2013-0087\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T01:23:24Z","timestamp":1753406604000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/ics\/article\/23\/1\/20-30\/111027"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,3,9]]},"references-count":41,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,3,9]]}},"alternative-id":["10.1108\/ICS-12-2013-0087"],"URL":"https:\/\/doi.org\/10.1108\/ics-12-2013-0087","relation":{},"ISSN":["2056-4961"],"issn-type":[{"type":"print","value":"2056-4961"}],"subject":[],"published":{"date-parts":[[2015,3,9]]}}}