2023 | Journal of the Association for Information Systems | Citations: 0
Authors: Balozian, Puzant; Burns, A.; Leidner, Dorothy
Abstract: Despite the increased focus on organizational security policies and programs, s ... Expand
Semantic filters: IT security defense
Topics: IT security IT security defense productivity IT security threat anonymity
Methods: case study qualitative interview personal interview theory development survey
Theories: information systems theory neutralization theory behavioral theory
2023 | Decision Support Systems | Citations: 1
Authors: Bera, Debalina; Ogbanufe, Obi; Kim, Dan J.
Abstract: Despite anti-phishing filters, social engineering-based cyber-attacks still resu ... Expand
Semantic filters: IT security defense
Topics: phishing email phishing electronic mail email spam personalization
Methods: term frequency–inverse document frequency natural language processing topic model discriminant analysis literature study
2023 | European Conference On Information Systems | Citations: 0
Authors: Eggert, Mathias; Weber, Jannik
Abstract: The popularity of social media and particularly Instagram grows steadily. Peopl ... Expand
Semantic filters: IT security defense
Topics: Instagram usability social media privacy IT security defense
Methods: structural equation modeling survey partial least squares regression computational algorithm literature study
2023 | HICSS | Citations: 0
Authors: Faltermaier, Stefan; Strunk, Kim; Obermeier, Michaela; Fiedler, Marina
Abstract: Desirable user behavior is key to cyber security in organizations. However, a co ... Expand
Semantic filters: IT security defense
Topics: IT security user behavior information technology capability IT security defense password
Methods: qualitative interview personal interview qualitative coding grounded theory case study
2023 | European Journal of Information Systems | Citations: 0
Authors: Ghahramani, Fereshteh; Yazdanmehr, Adel; Chen, Daniel; Wang, Jingguo
Abstract: This study explores ways to empower organisations to continuously improve their ... Expand
Semantic filters: IT security defense
Topics: data security information security management absorptive capacity IT security anonymity
Methods: survey statistical hypothesis test structural equation modeling conceptual modelling ordinary least square
Theories: dynamic capabilities theory
2023 | HICSS | Citations: 0
Authors: Hengstler, Sebastian; Kuehnel, Stephan; Trang, Simon
Abstract: Social learning theory has attracted increasing attention in recent years in ter ... Expand
Semantic filters: IT security defense
Topics: data security IT security defense behavioral intention data quality information security policy compliance
Methods: survey linear regression analysis theory development experiment descriptive statistic
2023 | Americas Conference on Information Systems | Citations: 0
Authors: Hofmeier, Manfred; Seidenfad, Karl; Rieb, Andreas; Lechner, Ulrike
Abstract: Regarding malicious (intentional) insider threats, the damage potential is part ... Expand
Semantic filters: IT security defense
Topics: insider threat IT security defense
Methods: qualitative content analysis qualitative coding qualitative interview
2023 | International Conference on Information Systems | Citations: 0
Authors: Kayhan, Varol; Shivendu, Shivendu; Behnia, Rouzbeh; Daniel, Clinton; Agrawal, Manish
Abstract: Threat hunting is sifting through system logs to detect malicious activities th ... Expand
Semantic filters: IT security defense
Topics: IT security application programming interface Hadoop Distributed File System website web analytics
Methods: natural language processing artificial neural network support vector machine term frequency–inverse document frequency DBSCAN
2023 | Information Systems Frontiers | Citations: 1
Authors: Krishna, Ben; Krishnan, Satish; Sebastian, M. P.
Abstract: Cyberattacks can be considered one of the fundamental challenges that paralyze t ... Expand
Semantic filters: IT security defense
Topics: IT security internet technology national culture electronic finance information system use
Methods: longitudinal research hierarchical linear modeling cross sectional research archival research time series analysis
Theories: trust theory cultural dimensions theory contingency theory theory of economic growth
2023 | Management Information Systems Quarterly | Citations: 1
Authors: Li, Wilson Weixun; Leung, Alvin; Yue, Wei
Abstract: Data breaches can severely damage a firm's reputation and its customers' confid ... Expand
Semantic filters: IT security defense
Topics: IT investment data breach IT security defense data security IT security threat
Methods: longitudinal research robustness check autocorrelation analysis survey literature study
Theories: institutional theory protection motivation theory