2023 | Journal of the Association for Information Systems | Citations: 0
Authors: Balozian, Puzant; Burns, A.; Leidner, Dorothy
Abstract: Despite the increased focus on organizational security policies and programs, s ... Expand
Semantic filters: cybersecurity behavior
Topics: IT security IT security defense productivity IT security threat anonymity
Methods: case study qualitative interview personal interview theory development survey
Theories: information systems theory neutralization theory behavioral theory
2023 | Americas Conference on Information Systems | Citations: 0
Authors: Batra, Gunjan; Saeed, Khawaja; Zafar, Humayun
Abstract: Organizations have opened up various digital interfaces through which customers ... Expand
Semantic filters: cybersecurity behavior
Topics: electronic authentication cybersecurity behavior password online banking information security practice
Methods: cluster analysis survey exploratory factor analysis data transformation descriptive statistic
2023 | HICSS | Citations: 0
Authors: Cram, W. Alec; D'Arcy, John
Abstract: A rich body of research examines the cybersecurity behavior of employees, with a ... Expand
Semantic filters: cybersecurity behavior
Topics: IT security data breach computer data storage cybersecurity behavior top management support
Methods: survey linguistic analysis company material
2023 | Information Systems Journal | Citations: 0
Authors: Cram, W. Alec; D'Arcy, John
Abstract: Managers who oversee cybersecurity policies commonly rely on managerial encourag ... Expand
Semantic filters: cybersecurity behavior
Topics: IT security top management support cybersecurity behavior pandemic privacy
Methods: survey SEM tool structural equation modeling survey design confirmatory factor analysis
Theories: fairness theory organizational behavior theory
2023 | European Journal of Information Systems | Citations: 0
Authors: Davis, Joshua; Agrawal, Deepti; Guo, Xiang
Abstract: Employee behaviour is fundamental to corporate information security (InfoSec) ca ... Expand
Semantic filters: cybersecurity behavior
Topics: knowledge base IT job cybersecurity behavior resource allocation electronic mail
Methods: survey design survey partial least squares regression psychometrics partial least squares path modeling
Theories: self determination theory
2023 | Information Systems Research | Citations: 0
Authors: Khern-am-nuai, Warut; Hashim, Matthew J.; Pinsonneault, Alain; Yang, Weining; Li, Ninghui
Abstract: Password-based authentication is the most commonly used method for gaining acces ... Expand
Semantic filters: cybersecurity behavior
Topics: password website data security electronic authentication application programming interface
Methods: experiment survey laboratory experiment experimental group field experiment
Theories: elaboration likelihood model
2023 | Information Systems Journal | Citations: 1
Authors: Mady, Ashraf; Gupta, Saurabh; Warkentin, Merrill
Abstract: Organisations implement a variety of knowledge mechanisms such as information se ... Expand
Semantic filters: cybersecurity behavior
Topics: data security email phishing security policy IT security task complexity
Methods: survey experiment Student's t-test parametric test survey design
Theories: construal level theory security compliance theory
2023 | HICSS | Citations: 0
Authors: Mattson, Tom; Aurigemma, Sal; Ren, Jie
Abstract: Most of the theories used in the behavioral security literature explain the vari ... Expand
Semantic filters: cybersecurity behavior
Topics: multi-factor authentication behavioral intention electronic mail data security data breach
Methods: qualitative coding personal interview logistic regression
Theories: attitude theory
2023 | HICSS | Citations: 0
Authors: Nehme, Alaa; Marler, Laura
Abstract: Extra-role security behavior has been recognized as a salient element of informa ... Expand
Semantic filters: cybersecurity behavior
Topics: data security participatory design personality cybersecurity behavior decision making
Methods: design methodology theory development conceptual modelling
Theories: organizational behavior theory buy-in theory of participation motivation theory
2023 | Information Systems Research | Citations: 7
Authors: Susarla, Anjana; Gopal, Ram; Thatcher, Jason Bennett; Sarker, Suprateek
Abstract: Funding: A. Susarla was funded by an R01 grant from the National Library of Medi ... Expand
Semantic filters: cybersecurity behavior
Topics: generative AI cybersecurity behavior internet technology intellectual property IS discipline
Methods: chatGPT literature study survey qualitative interview structural equation modeling