Semantic Filter
show all semantic filters
Found 198 articles
  • An Adversarial Dance: Toward an Understanding of Insiders’ Responses to Organizational Information Security Measures

    PDF

    2023 | Journal of the Association for Information Systems | Citations: 0

    Authors: Balozian, Puzant; Burns, A.; Leidner, Dorothy

    Abstract: Despite the increased focus on organizational security policies and programs, s ... Expand

    Semantic filters: IT security defense

    Topics: IT security IT security defense productivity IT security threat anonymity

    Methods: case study qualitative interview personal interview theory development survey

    Theories: information systems theory neutralization theory behavioral theory

  • Towards a thematic dimensional framework of online fraud: An exploration of fraudulent email attack tactics and intentions

    PDF

    2023 | Decision Support Systems | Citations: 1

    Authors: Bera, Debalina; Ogbanufe, Obi; Kim, Dan J.

    Abstract: Despite anti-phishing filters, social engineering-based cyber-attacks still resu ... Expand

    Semantic filters: IT security defense

    Topics: phishing email phishing electronic mail email spam personalization

    Methods: term frequency–inverse document frequency natural language processing topic model discriminant analysis literature study

  • What drives the purchase decision in Instagram stores?

    2023 | European Conference On Information Systems | Citations: 0

    Authors: Eggert, Mathias; Weber, Jannik

    Abstract: The popularity of social media and particularly Instagram grows steadily. Peopl ... Expand

    Semantic filters: IT security defense

    Topics: Instagram usability social media privacy IT security defense

    Methods: structural equation modeling survey partial least squares regression computational algorithm literature study

  • Managing Organizational Cyber Security – The Distinct Role of Internalized Responsibility

    2023 | HICSS | Citations: 0

    Authors: Faltermaier, Stefan; Strunk, Kim; Obermeier, Michaela; Fiedler, Marina

    Abstract: Desirable user behavior is key to cyber security in organizations. However, a co ... Expand

    Semantic filters: IT security defense

    Topics: IT security user behavior information technology capability IT security defense password

    Methods: qualitative interview personal interview qualitative coding grounded theory case study

  • Continuous improvement of information security management: an organisational learning perspective

    PDF

    2023 | European Journal of Information Systems | Citations: 0

    Authors: Ghahramani, Fereshteh; Yazdanmehr, Adel; Chen, Daniel; Wang, Jingguo

    Abstract: This study explores ways to empower organisations to continuously improve their ... Expand

    Semantic filters: IT security defense

    Topics: data security information security management absorptive capacity IT security anonymity

    Methods: survey statistical hypothesis test structural equation modeling conceptual modelling ordinary least square

    Theories: dynamic capabilities theory

  • Is Social Learning Always Helpful? Using Quantile Regression to Examine the Impact of Social Learning on Information Security Policy Compliance Behavior.

    2023 | HICSS | Citations: 0

    Authors: Hengstler, Sebastian; Kuehnel, Stephan; Trang, Simon

    Abstract: Social learning theory has attracted increasing attention in recent years in ter ... Expand

    Semantic filters: IT security defense

    Topics: data security IT security defense behavioral intention data quality information security policy compliance

    Methods: survey linear regression analysis theory development experiment descriptive statistic

  • Risk Factors for Malicious Insider Threats – An Analysis of Attack Scenarios

    2023 | Americas Conference on Information Systems | Citations: 0

    Authors: Hofmeier, Manfred; Seidenfad, Karl; Rieb, Andreas; Lechner, Ulrike

    Abstract: Regarding malicious (intentional) insider threats, the damage potential is part ... Expand

    Semantic filters: IT security defense

    Topics: insider threat IT security defense

    Methods: qualitative content analysis qualitative coding qualitative interview

  • Unsupervised Threat Hunting using Continuous Bag of Terms and Time (CBoTT)

    2023 | International Conference on Information Systems | Citations: 0

    Authors: Kayhan, Varol; Shivendu, Shivendu; Behnia, Rouzbeh; Daniel, Clinton; Agrawal, Manish

    Abstract: Threat hunting is sifting through system logs to detect malicious activities th ... Expand

    Semantic filters: IT security defense

    Topics: IT security application programming interface Hadoop Distributed File System website web analytics

    Methods: natural language processing artificial neural network support vector machine term frequency–inverse document frequency DBSCAN

  • Examining the Relationship between National Cybersecurity Commitment, Culture, and Digital Payment Usage: An Institutional Trust Theory Perspective

    PDF

    2023 | Information Systems Frontiers | Citations: 1

    Authors: Krishna, Ben; Krishnan, Satish; Sebastian, M. P.

    Abstract: Cyberattacks can be considered one of the fundamental challenges that paralyze t ... Expand

    Semantic filters: IT security defense

    Topics: IT security internet technology national culture electronic finance information system use

    Methods: longitudinal research hierarchical linear modeling cross sectional research archival research time series analysis

    Theories: trust theory cultural dimensions theory contingency theory theory of economic growth

  • Where is IT in Information Security? The Interrelationship among IT Investment, Security Awareness, and Data Breaches

    2023 | Management Information Systems Quarterly | Citations: 1

    Authors: Li, Wilson Weixun; Leung, Alvin; Yue, Wei

    Abstract: Data breaches can severely damage a firm's reputation and its customers' confid ... Expand

    Semantic filters: IT security defense

    Topics: IT investment data breach IT security defense data security IT security threat

    Methods: longitudinal research robustness check autocorrelation analysis survey literature study

    Theories: institutional theory protection motivation theory