Semantic Filter
show all semantic filters
Found 28 articles
  • A text summary-based method to detect new events from streams of online news articles

    PDF

    2022 | Information & Management | Citations: 0

    Authors: Lee, Yen-Hsien; Wei, Chih-Ping; Hu, Paul Jen-Hwa; Wu, Pao-Feng; Jiang, How

    Abstract: New event detection (NED), which is crucial to firms’ environmental surveillance ... Expand

    Semantic filters: computer virus

    Topics: digital news domain-specific language website computer virus evaluation criteria

    Methods: BERT deep learning cluster analysis decision tree classification supervised learning

  • Local learning from municipal ransomware attacks: A geographically weighted analysis

    PDF

    2021 | Information & Management | Citations: 0

    Authors: Marett, Kent; Nabors, Misty

    Abstract: The prevalence of security threats like ransomware continues to increase and vic ... Expand

    Semantic filters: computer virus

    Topics: ransomware data security IT security IT security threat website

    Methods: autocorrelation analysis analysis of covariance longitudinal research regression analysis method cluster analysis

  • Local Learning from Municipal Ransomware Attacks

    2020 | Americas Conference on Information Systems | Citations: 0

    Authors: Marett, Kent; Nabors, Misty

    Abstract: Ransomware is not only the bane of private businesses and publicly-traded compa ... Expand

    Semantic filters: computer virus

    Topics: ransomware IT security threat IT security internet technology social media

    Methods: analysis of covariance survey regression analysis method cross sectional survey digital trace data

  • Effects of sanctions, moral beliefs, and neutralization on information security policy violations across cultures

    PDF

    2020 | Information & Management | Citations: 12

    Authors: Vance, Anthony; Siponen, Mikko T.; Straub, Detmar W.

    Abstract: A principal concern of organizations is the failure of employees to comply with ... Expand

    Semantic filters: computer virus

    Topics: national culture cross cultural research security policy computer virus laptop computer

    Methods: theory development partial least squares regression structural equation modeling survey parametric test

    Theories: deterrence theory cultural dimensions theory neutralization theory

  • See No Evil, Hear No Evil? Dissecting the Impact of Online Hacker Forums

    PDF

    2019 | Management Information Systems Quarterly | Citations: 26

    Authors: Yue, Wei T.; Qiu-Hong Wang; Kai-Lung Hui

    Abstract: Online hacker forums offer a prominent avenue for sharing hacking knowledge. Usi ... Expand

    Semantic filters: computer virus

    Topics: denial of service attack internet technology computer virus Python open source

    Methods: term frequency–inverse document frequency latent dirichlet allocation forums posting qualitative content analysis topic model

  • Software Diversity for Improved Network Security: Optimal Distribution of Software-Based Shared Vulnerabilities

    PDF

    2017 | Information Systems Research | Citations: 0

    Authors: Temizkan, Orcun; Park, Sungjune; Saydam, Cem

    Abstract: Firms, and other agencies, tend to adopt widely used software to gain economic b ... Expand

    Semantic filters: computer virus

    Topics: pandemic corporate network security cloud computing IT security threat computer virus

    Methods: computational algorithm simulation experiment optimization model linear optimization

    Theories: information theory

  • ‘Breaching’ Auditor Judgments of Information Security Effectiveness

    2014 | International Conference on Information Systems | Citations: 0

    Authors: Basoglu, K Asli; D’Arcy, John

    Abstract: In this in-progress study we explore whether aspects of a prior data security br ... Expand

    Semantic filters: computer virus

    Topics: data breach Google+ Sarbanes–Oxley Act internet technology search engine

    Methods: event study statistical hypothesis test descriptive statistic cross sectional survey

  • Capturing the essence of word-of-mouth for social commerce: Assessing the quality of online e-commerce reviews by a semi-supervised approach

    PDF

    2013 | Decision Support Systems | Citations: 0

    Authors: Zheng, Xiaolin; Zhu, Shuai; Lin, Zhangxi

    Abstract: In e-commerce, online product reviews significantly influence the purchase decis ... Expand

    Semantic filters: computer virus

    Topics: online review user-generated content social network spamming experience good

    Methods: experiment support vector machine machine learning computational algorithm ensemble learning

  • Information Security Risk Management: In Which Security Solutions Is It Worth Investing?

    PDF

    2011 | Communications of the Association for Information Systems | Citations: 0

    Authors: Fenz, Stefan; Ekelhart, Andreas; Neubauer, Thomas

    Abstract: As companies are increasingly exposed to information security threats, decision ... Expand

    Semantic filters: computer virus

    Topics: knowledge representation business process management data security information security risk risk management

    Methods: case study ontological modelling literature study Bayesian network business process modeling

  • The Economic Effect of Privacy Breach Announcements on Stocks: A Comprehensive Empirical Investigation

    2011 | Americas Conference on Information Systems | Citations: 0

    Authors: Nicholas-Donald, Aurelia; Matus, Jesus Francisco; Ryu, SeungEui; Mahmood, Adam M

    Abstract: The 2009 CSI Computer Crime and Security Survey indicate that the financial frau ... Expand

    Semantic filters: computer virus

    Topics: privacy website computer virus denial of service attack IT security threat

    Methods: event study longitudinal research LexisNexis