2022 | Decision Support Systems | Citations: 0
Authors: Biswas, Baidyanath; Mukhopadhyay, Arunabha; Bhattacharjee, Sudip; Kumar, Ajay; Delen, Dursun
Abstract: Online hacker communities are meeting spots for aspiring and seasoned cybercrimi ... Expand
Semantic filters: SQL injection
Topics: IT security IT security threat darknet source code logistics management
Methods: classification method sentiment analysis decision tree classification term frequency–inverse document frequency literature study
Theories: social exchange theory social practice theory
2022 | Journal of the Association for Information Systems | Citations: 0
Authors: Mou, Jian; Cohen, Jason; Bhattacherjee, Anol; Kim, Jongki
Abstract: Information security is one of the important domains of information systems res ... Expand
Semantic filters: SQL injection
Topics: data security self efficacy cybersecurity behavior malware social norm
Methods: meta analysis structural equation modeling descriptive statistic literature sample SEM tool
Theories: expectancy–value theory
2021 | Journal of Strategic Information Systems | Citations: 0
Authors: Dhillon, Gurpreet; Smith, Kane; Dissanayaka, Indika
Abstract: This paper undertakes a systematic review of the Information Systems Security li ... Expand
Semantic filters: SQL injection
Topics: IT security IT security threat systems design information security policy compliance malware
Methods: delphi study literature study topic model computational algorithm machine learning
Theories: socio technical theory
2021 | Americas Conference on Information Systems | Citations: 0
Authors: Yang, Hao; Zhang, Jinfeng; Zhang, Xiong
Abstract: In this study, we examine enterprises' response to network vulnerabilities. We ... Expand
Semantic filters: SQL injection
Topics: crowdsourcing IT security threat SQL injection missing data Python
Methods: sentiment analysis multiple linear regression linear regression analysis regression analysis method parametric test
2020 | Communications of the Association for Information Systems | Citations: 1
Authors: Roumani, Yaman; Nwankpa, Joseph
Abstract: With the increasing number and severity of security incidents and exploits, info ... Expand
Semantic filters: SQL injection
Topics: electronic authentication research and development database system privacy SQL injection
Methods: regression analysis method survival analysis proportional hazards model game theoretical model Compustat
Theories: game theory theory of bounded rationality
2020 | Americas Conference on Information Systems | Citations: 0
Authors: Tian, Xin; Li, Zhigang
Abstract: ... Expand
Semantic filters: SQL injection
Topics: IT security data security SQL injection operating system
Methods: survey descriptive statistic linear regression analysis term frequency–inverse document frequency personal interview
2019 | Americas Conference on Information Systems | Citations: 0
Authors: He, Wu; Anwar, Mohd; Ash, Ivan; Li, Ling; Yuan, Xiaohong; Xu, Li; Tian, Xin
Abstract: This paper presents a research study conducted to investigate the effect of dif ... Expand
Semantic filters: SQL injection
Topics: malware IT security self efficacy cybersecurity behavior behavioral intention
Methods: survey analysis of covariance experimental group experiment qualitative interview
2019 | Information Systems Frontiers | Citations: 3
Authors: Miaoui, Yosra; Boudriga, Noureddine
Abstract: We propose in this work to use the utility theory to compute the optimal securit ... Expand
Semantic filters: SQL injection
Topics: logistics management IT security threat database system artificial intelligence SQL injection
Methods: computational algorithm game theoretical model regression analysis method survey parametric test
Theories: utility theory expected utility theory decision theory
2018 | HICSS | Citations: 0
Authors: Zahedi, Mansooreh; Babar, Muhammad Ali; Treude, Christoph
Abstract: When developers gain thorough understanding and knowledge of software security, ... Expand
Semantic filters: SQL injection
Topics: IT security threat data encryption password electronic authentication authorization
Methods: topic model latent dirichlet allocation design pattern qualitative content analysis mixed method
2017 | HICSS | Citations: 0
Authors: Chen, Hong-Mei; Kazman, Rick; Monarch, Ira; Wang, Ping
Abstract: The cybersecurity community typically reacts to attacks after they occur. Being ... Expand
Semantic filters: SQL injection
Topics: big data IT security knowledge representation database system SQL injection
Methods: natural language processing cluster analysis ontological modelling machine learning sentiment analysis