Semantic Filter
show all semantic filters
Found 10 articles
  • The Application of Role-Based Framework in Preventing Internal Identity Theft Related Crimes: A Qualitative Case Study of UK Retail Companies

    PDF

    2023 | Information Systems Frontiers | Citations: 0

    Authors: Okeke, Romanus Izuchukwu; Eiza, Max Hashem

    Abstract: This paper aims to examine the challenges of preventing internal identity theft ... Expand

    Semantic filters: conceptual analysis IT security

    Topics: criminality data security IT security outsourcing IT security threat

    Methods: case study qualitative interview personal interview survey qualitative content analysis

    Theories: organizational role theory

  • No Rose without a thorn: Board IT competence and market reactions to operational IT failures

    PDF

    2021 | Information & Management | Citations: 6

    Authors: Benaroch, Michel; Fink, Lior

    Abstract: The continuous escalation in cybersecurity risk and the frequency of operational ... Expand

    Semantic filters: conceptual analysis IT security

    Topics: IS failure IS value IT risk management IT governance database system

    Methods: robustness check descriptive statistic econometric modeling data transformation statistical hypothesis test

    Theories: agency theory lemon market theory

  • 30 years of intelligence models in management and business: A bibliometric review

    PDF

    2019 | International Journal of Information Management | Citations: 0

    Authors: López-Robles, J.R.; Otegi-Olaso, J.R.; Porto Gómez, I.; Cobo, M.J.

    Abstract: The critical factors in the big data era are collection, analysis, and dissemina ... Expand

    Semantic filters: conceptual analysis IT security

    Topics: marketing intelligence business intelligence competitive intelligence information management IT security

    Methods: bibliometric analysis maturity model design science conceptual analysis cluster analysis

    Theories: theory of economic growth

  • Information Systems as Representations: A Review of the Theory and Evidence

    PDF

    2019 | Journal of the Association for Information Systems | Citations: 28

    Authors: Recker, Jan; Indulska, Marta; Green, Peter; Burton-Jones, Andrew; Weber, Ron

    Abstract: Representation theory proposes that the basic purpose of an information system ( ... Expand

    Semantic filters: conceptual analysis IT security

    Topics: knowledge representation affordance systems analysis information system use search engine

    Methods: literature sample qualitative coding computational algorithm machine learning literature study

    Theories: theory of affordance representation theory

  • UNDERSTANDING CROWDTURFING: THE DIFFERENT ETHICAL LOGICS BEHIND THE CLANDESTINE INDUSTRY OF DECEPTION

    2017 | European Conference On Information Systems | Citations: 0

    Authors: Rinta-Kahila, Tapani; Soliman, Wael

    Abstract: Crowdturfing, the dark side and usually unnoticed face of crowdsourcing, represe ... Expand

    Semantic filters: conceptual analysis IT security

    Topics: information system use internet technology IT security data security crowdsourcing

    Methods: conceptual analysis

    Theories: deterrence theory

  • A Constructive Approach to Information Systems Security Training: An Action Research Experience

    2008 | Americas Conference on Information Systems | Citations: 3

    Authors: Heikka, Juhani

    Abstract: Information systems (IS) security breaches cause significant losses to organizat ... Expand

    Semantic filters: conceptual analysis IT security

    Topics: IT security training cybersecurity awareness IT security data security IT job

    Methods: qualitative interview action research personal interview literature study conceptual analysis

    Theories: learning theory

  • Mapping Information Security Standards: A Counter-Terrorism Example

    2008 | European Conference On Information Systems | Citations: 0

    Authors: Ridley, Gail; Hartnett, Jacky; Jarern-iamsakul, Wilumpa

    Abstract: Although practitioners have mapped the alignment between IT-related standards, t ... Expand

    Semantic filters: conceptual analysis IT security

    Topics: COBIT IT security terrorist incident information systems standardization IT alignment

    Methods: qualitative content analysis conceptual analysis

  • A Review of Information Security Issues and Respective Research Contributions

    PDF

    2007 | ACM SIGMIS Database | Citations: 5

    Authors: Siponen, Mikko T.; Oinas-Kukkonen, Harri

    Abstract: This paper identifies four security issues (access to Information Systems, secur ... Expand

    Semantic filters: conceptual analysis IT security

    Topics: data security IT security threat reference discipline electronic commerce security policy

    Methods: metamodel design science conceptual analysis survey

    Theories: semiotic theory

  • Analysis of modern IS security development approaches: towards the next generation of social and adaptable ISS methods

    PDF

    2005 | Information and Organization | Citations: 32

    Authors: Siponen, Mikko T.

    Abstract: Various modern approaches to Information Systems Security (ISS) development, inf ... Expand

    Semantic filters: conceptual analysis IT security

    Topics: systems development IT security system development method data security usability

    Methods: action research conceptual analysis grounded theory simulation case study

  • Information Security: An Organizational Change Perspective

    2004 | Americas Conference on Information Systems | Citations: 7

    Authors: Cline, Melinda; Jensen, Bradley

    Abstract: This research examines changing information security requirements and the strate ... Expand

    Semantic filters: conceptual analysis IT security

    Topics: data security IT security threat organizational change IT security

    Methods: qualitative interview theory development conceptual analysis qualitative content analysis conceptual modelling