2023 | Information Systems Frontiers | Citations: 0
Authors: Okeke, Romanus Izuchukwu; Eiza, Max Hashem
Abstract: This paper aims to examine the challenges of preventing internal identity theft ... Expand
Semantic filters: conceptual analysis IT security
Topics: criminality data security IT security outsourcing IT security threat
Methods: case study qualitative interview personal interview survey qualitative content analysis
Theories: organizational role theory
2021 | Information & Management | Citations: 6
Authors: Benaroch, Michel; Fink, Lior
Abstract: The continuous escalation in cybersecurity risk and the frequency of operational ... Expand
Semantic filters: conceptual analysis IT security
Topics: IS failure IS value IT risk management IT governance database system
Methods: robustness check descriptive statistic econometric modeling data transformation statistical hypothesis test
Theories: agency theory lemon market theory
2019 | International Journal of Information Management | Citations: 0
Authors: López-Robles, J.R.; Otegi-Olaso, J.R.; Porto Gómez, I.; Cobo, M.J.
Abstract: The critical factors in the big data era are collection, analysis, and dissemina ... Expand
Semantic filters: conceptual analysis IT security
Topics: marketing intelligence business intelligence competitive intelligence information management IT security
Methods: bibliometric analysis maturity model design science conceptual analysis cluster analysis
Theories: theory of economic growth
2019 | Journal of the Association for Information Systems | Citations: 28
Authors: Recker, Jan; Indulska, Marta; Green, Peter; Burton-Jones, Andrew; Weber, Ron
Abstract: Representation theory proposes that the basic purpose of an information system ( ... Expand
Semantic filters: conceptual analysis IT security
Topics: knowledge representation affordance systems analysis information system use search engine
Methods: literature sample qualitative coding computational algorithm machine learning literature study
Theories: theory of affordance representation theory
2017 | European Conference On Information Systems | Citations: 0
Authors: Rinta-Kahila, Tapani; Soliman, Wael
Abstract: Crowdturfing, the dark side and usually unnoticed face of crowdsourcing, represe ... Expand
Semantic filters: conceptual analysis IT security
Topics: information system use internet technology IT security data security crowdsourcing
Methods: conceptual analysis
Theories: deterrence theory
2008 | Americas Conference on Information Systems | Citations: 3
Authors: Heikka, Juhani
Abstract: Information systems (IS) security breaches cause significant losses to organizat ... Expand
Semantic filters: conceptual analysis IT security
Topics: IT security training cybersecurity awareness IT security data security IT job
Methods: qualitative interview action research personal interview literature study conceptual analysis
Theories: learning theory
2008 | European Conference On Information Systems | Citations: 0
Authors: Ridley, Gail; Hartnett, Jacky; Jarern-iamsakul, Wilumpa
Abstract: Although practitioners have mapped the alignment between IT-related standards, t ... Expand
Semantic filters: conceptual analysis IT security
Topics: COBIT IT security terrorist incident information systems standardization IT alignment
Methods: qualitative content analysis conceptual analysis
2007 | ACM SIGMIS Database | Citations: 5
Authors: Siponen, Mikko T.; Oinas-Kukkonen, Harri
Abstract: This paper identifies four security issues (access to Information Systems, secur ... Expand
Semantic filters: conceptual analysis IT security
Topics: data security IT security threat reference discipline electronic commerce security policy
Methods: metamodel design science conceptual analysis survey
Theories: semiotic theory
2005 | Information and Organization | Citations: 32
Authors: Siponen, Mikko T.
Abstract: Various modern approaches to Information Systems Security (ISS) development, inf ... Expand
Semantic filters: conceptual analysis IT security
Topics: systems development IT security system development method data security usability
Methods: action research conceptual analysis grounded theory simulation case study
2004 | Americas Conference on Information Systems | Citations: 7
Authors: Cline, Melinda; Jensen, Bradley
Abstract: This research examines changing information security requirements and the strate ... Expand
Semantic filters: conceptual analysis IT security
Topics: data security IT security threat organizational change IT security
Methods: qualitative interview theory development conceptual analysis qualitative content analysis conceptual modelling