Semantic Filter
show all semantic filters
Found 17 articles
  • A text-mining based cyber-risk assessment and mitigation framework for critical analysis of online hacker forums

    PDF

    2022 | Decision Support Systems | Citations: 0

    Authors: Biswas, Baidyanath; Mukhopadhyay, Arunabha; Bhattacharjee, Sudip; Kumar, Ajay; Delen, Dursun

    Abstract: Online hacker communities are meeting spots for aspiring and seasoned cybercrimi ... Expand

    Semantic filters: SQL injection

    Topics: IT security IT security threat darknet source code logistics management

    Methods: classification method sentiment analysis decision tree classification term frequency–inverse document frequency literature study

    Theories: social exchange theory social practice theory

  • A Test of Protection Motivation Theory in the Information Security Literature: A Meta-Analytic Structural Equation Modeling Approach

    PDF

    2022 | Journal of the Association for Information Systems | Citations: 0

    Authors: Mou, Jian; Cohen, Jason; Bhattacherjee, Anol; Kim, Jongki

    Abstract: Information security is one of the important domains of information systems res ... Expand

    Semantic filters: SQL injection

    Topics: data security self efficacy cybersecurity behavior malware social norm

    Methods: meta analysis structural equation modeling descriptive statistic literature sample SEM tool

    Theories: expectancy–value theory

  • Information systems security research agenda: Exploring the gap between research and practice

    PDF

    2021 | Journal of Strategic Information Systems | Citations: 0

    Authors: Dhillon, Gurpreet; Smith, Kane; Dissanayaka, Indika

    Abstract: This paper undertakes a systematic review of the Information Systems Security li ... Expand

    Semantic filters: SQL injection

    Topics: IT security IT security threat systems design information security policy compliance malware

    Methods: delphi study literature study topic model computational algorithm machine learning

    Theories: socio technical theory

  • Network Vulnerability and Enterprises’ Response: The Preliminary Analysis

    2021 | Americas Conference on Information Systems | Citations: 0

    Authors: Yang, Hao; Zhang, Jinfeng; Zhang, Xiong

    Abstract: In this study, we examine enterprises' response to network vulnerabilities. We ... Expand

    Semantic filters: SQL injection

    Topics: crowdsourcing IT security threat SQL injection missing data Python

    Methods: sentiment analysis multiple linear regression linear regression analysis regression analysis method parametric test

  • Examining Exploitability Risk of Vulnerabilities: A Hazard Model

    PDF

    2020 | Communications of the Association for Information Systems | Citations: 1

    Authors: Roumani, Yaman; Nwankpa, Joseph

    Abstract: With the increasing number and severity of security incidents and exploits, info ... Expand

    Semantic filters: SQL injection

    Topics: electronic authentication research and development database system privacy SQL injection

    Methods: regression analysis method survival analysis proportional hazards model game theoretical model Compustat

    Theories: game theory theory of bounded rationality

  • Collaborative Learning for Information Security Topics: A Pilot Study

    2020 | Americas Conference on Information Systems | Citations: 0

    Authors: Tian, Xin; Li, Zhigang

    Abstract: ... Expand

    Semantic filters: SQL injection

    Topics: IT security data security SQL injection operating system

    Methods: survey descriptive statistic linear regression analysis term frequency–inverse document frequency personal interview

  • Effects of Evidence-Based Malware Cybersecurity Training on Employees

    2019 | Americas Conference on Information Systems | Citations: 0

    Authors: He, Wu; Anwar, Mohd; Ash, Ivan; Li, Ling; Yuan, Xiaohong; Xu, Li; Tian, Xin

    Abstract: This paper presents a research study conducted to investigate the effect of dif ... Expand

    Semantic filters: SQL injection

    Topics: malware IT security self efficacy cybersecurity behavior behavioral intention

    Methods: survey analysis of covariance experimental group experiment qualitative interview

  • Enterprise security investment through time when facing different types of vulnerabilities

    PDF

    2019 | Information Systems Frontiers | Citations: 3

    Authors: Miaoui, Yosra; Boudriga, Noureddine

    Abstract: We propose in this work to use the utility theory to compute the optimal securit ... Expand

    Semantic filters: SQL injection

    Topics: logistics management IT security threat database system artificial intelligence SQL injection

    Methods: computational algorithm game theoretical model regression analysis method survey parametric test

    Theories: utility theory expected utility theory decision theory

  • An Empirical Study of Security Issues Posted in Open Source Projects

    2018 | HICSS | Citations: 0

    Authors: Zahedi, Mansooreh; Babar, Muhammad Ali; Treude, Christoph

    Abstract: When developers gain thorough understanding and knowledge of software security, ... Expand

    Semantic filters: SQL injection

    Topics: IT security threat data encryption password electronic authentication authorization

    Methods: topic model latent dirichlet allocation design pattern qualitative content analysis mixed method

  • Can Cybersecurity Be Proactive? A Big Data Approach and Challenges

    PDF

    2017 | HICSS | Citations: 0

    Authors: Chen, Hong-Mei; Kazman, Rick; Monarch, Ira; Wang, Ping

    Abstract: The cybersecurity community typically reacts to attacks after they occur. Being ... Expand

    Semantic filters: SQL injection

    Topics: big data IT security knowledge representation database system SQL injection

    Methods: natural language processing cluster analysis ontological modelling machine learning sentiment analysis