Semantic Filter
show all semantic filters
Found 166 articles
  • An Adversarial Dance: Toward an Understanding of Insiders’ Responses to Organizational Information Security Measures

    PDF

    2023 | Journal of the Association for Information Systems | Citations: 0

    Authors: Balozian, Puzant; Burns, A.; Leidner, Dorothy

    Abstract: Despite the increased focus on organizational security policies and programs, s ... Expand

    Semantic filters: cybersecurity behavior

    Topics: IT security IT security defense productivity IT security threat anonymity

    Methods: case study qualitative interview personal interview theory development survey

    Theories: information systems theory neutralization theory behavioral theory

  • Are Information Security Practices Driven by the Likelihood and potential Impact of Security Events?

    2023 | Americas Conference on Information Systems | Citations: 0

    Authors: Batra, Gunjan; Saeed, Khawaja; Zafar, Humayun

    Abstract: Organizations have opened up various digital interfaces through which customers ... Expand

    Semantic filters: cybersecurity behavior

    Topics: electronic authentication cybersecurity behavior password online banking information security practice

    Methods: cluster analysis survey exploratory factor analysis data transformation descriptive statistic

  • Barking Up the Wrong Tree? Reconsidering Policy Compliance as a Dependent Variable within Behavioral Cybersecurity Research

    2023 | HICSS | Citations: 0

    Authors: Cram, W. Alec; D'Arcy, John

    Abstract: A rich body of research examines the cybersecurity behavior of employees, with a ... Expand

    Semantic filters: cybersecurity behavior

    Topics: IT security data breach computer data storage cybersecurity behavior top management support

    Methods: survey linguistic analysis company material

  • ‘What a waste of time’: An examination of cybersecurity legitimacy

    PDF

    2023 | Information Systems Journal | Citations: 0

    Authors: Cram, W. Alec; D'Arcy, John

    Abstract: Managers who oversee cybersecurity policies commonly rely on managerial encourag ... Expand

    Semantic filters: cybersecurity behavior

    Topics: IT security top management support cybersecurity behavior pandemic privacy

    Methods: survey SEM tool structural equation modeling survey design confirmatory factor analysis

    Theories: fairness theory organizational behavior theory

  • Enhancing users’ security engagement through cultivating commitment: the role of psychological needs fulfilment

    PDF

    2023 | European Journal of Information Systems | Citations: 0

    Authors: Davis, Joshua; Agrawal, Deepti; Guo, Xiang

    Abstract: Employee behaviour is fundamental to corporate information security (InfoSec) ca ... Expand

    Semantic filters: cybersecurity behavior

    Topics: knowledge base IT job cybersecurity behavior resource allocation electronic mail

    Methods: survey design survey partial least squares regression psychometrics partial least squares path modeling

    Theories: self determination theory

  • Augmenting Password Strength Meter Design Using the Elaboration Likelihood Model: Evidence from Randomized Experiments

    PDF

    2023 | Information Systems Research | Citations: 0

    Authors: Khern-am-nuai, Warut; Hashim, Matthew J.; Pinsonneault, Alain; Yang, Weining; Li, Ninghui

    Abstract: Password-based authentication is the most commonly used method for gaining acces ... Expand

    Semantic filters: cybersecurity behavior

    Topics: password website data security electronic authentication application programming interface

    Methods: experiment survey laboratory experiment experimental group field experiment

    Theories: elaboration likelihood model

  • The effects of knowledge mechanisms on employees' information security threat construal

    PDF

    2023 | Information Systems Journal | Citations: 1

    Authors: Mady, Ashraf; Gupta, Saurabh; Warkentin, Merrill

    Abstract: Organisations implement a variety of knowledge mechanisms such as information se ... Expand

    Semantic filters: cybersecurity behavior

    Topics: data security email phishing security policy IT security task complexity

    Methods: survey experiment Student's t-test parametric test survey design

    Theories: construal level theory security compliance theory

  • Close the Intention-Behavior Gap via Attitudes: Case Study of the Volitional Adoption of a Two-Factor Authentication Service

    2023 | HICSS | Citations: 0

    Authors: Mattson, Tom; Aurigemma, Sal; Ren, Jie

    Abstract: Most of the theories used in the behavioral security literature explain the vari ... Expand

    Semantic filters: cybersecurity behavior

    Topics: multi-factor authentication behavioral intention electronic mail data security data breach

    Methods: qualitative coding personal interview logistic regression

    Theories: attitude theory

  • Buying in and Feeling Responsible: A Model of Extra-role Security Behavior

    2023 | HICSS | Citations: 0

    Authors: Nehme, Alaa; Marler, Laura

    Abstract: Extra-role security behavior has been recognized as a salient element of informa ... Expand

    Semantic filters: cybersecurity behavior

    Topics: data security participatory design personality cybersecurity behavior decision making

    Methods: design methodology theory development conceptual modelling

    Theories: organizational behavior theory buy-in theory of participation motivation theory

  • The Janus Effect of Generative AI: Charting the Path for Responsible Conduct of Scholarly Activities in Information Systems

    PDF

    2023 | Information Systems Research | Citations: 7

    Authors: Susarla, Anjana; Gopal, Ram; Thatcher, Jason Bennett; Sarker, Suprateek

    Abstract: Funding: A. Susarla was funded by an R01 grant from the National Library of Medi ... Expand

    Semantic filters: cybersecurity behavior

    Topics: generative AI cybersecurity behavior internet technology intellectual property IS discipline

    Methods: chatGPT literature study survey qualitative interview structural equation modeling