Semantic Filter
show all semantic filters
Found 43 articles
  • A deep learning-based Cyber-risk Management framework for smart cities

    2023 | Americas Conference on Information Systems | Citations: 0

    Authors: Sharma, Kalpit; Mukhopadhyay, Arunabha

    Abstract: A malicious hacker can compromise speed limit signs in a smart city, leading to ... Expand

    Semantic filters: general deterrence theory

    Topics: smart city phishing financial information system autonomous driving system

    Methods: survey artificial neural network decision tree classification deep learning

    Theories: protection motivation theory general deterrence theory

  • How Do Paternalistic Leaders Motivate Employees’ Information Security Compliance? Building a Climate and Applying Sanctions

    PDF

    2023 | Journal of the Association for Information Systems | Citations: 0

    Authors: Zhu, Jiawen; Feng, Gengzhong; Liang, Huigang; Tsui, Kwok-Leung

    Abstract: This paper examines the underlying mechanisms through which paternalistic leade ... Expand

    Semantic filters: general deterrence theory

    Topics: data security organizational context information security management organizational value IT policy

    Methods: survey digital trace data self reported survey post-hoc analysis factor analysis

    Theories: general deterrence theory

  • Common Misunderstandings of Deterrence Theory in Information Systems Research and Future Research Directions

    PDF

    2022 | ACM SIGMIS Database | Citations: 0

    Authors: Siponen, Mikko; Soliman, Wael; Vance, Anthony

    Abstract: In the 1980s, information systems (IS) borrowed deterrence theory (DT) from the ... Expand

    Semantic filters: general deterrence theory

    Topics: IT security IT security threat data security phishing social network

    Methods: literature sample literature study synthesis field experiment experimental group

    Theories: deterrence theory general deterrence theory

  • How to deal with corruption? Examining the roles of e-government maturity, government administrative effectiveness, and virtual social networks diffusion

    PDF

    2021 | International Journal of Information Management | Citations: 0

    Authors: Arayankalam, Jithesh; Khan, Anupriya; Krishnan, Satish

    Abstract: The role of e-government in combating corruption is an active area of research i ... Expand

    Semantic filters: general deterrence theory

    Topics: government system social network legal information system knowledge base societal evaluation criteria

    Methods: structural equation modeling mediation analysis archival research partial least squares path modeling survey

    Theories: general deterrence theory lemon market theory

  • When enough is enough: Investigating the antecedents and consequences of information security fatigue

    PDF

    2021 | Information Systems Journal | Citations: 9

    Authors: Cram, W. Alec; Proudfoot, Jeffrey G.; D'Arcy, John

    Abstract: Despite concerns raised by practitioners, the potential downside of the informat ... Expand

    Semantic filters: general deterrence theory

    Topics: security policy information security policy compliance IT security data security IT security threat

    Methods: qualitative interview qualitative coding grounded theory cross sectional survey longitudinal survey

    Theories: general deterrence theory protection motivation theory theory of planned behavior

  • High-Risk Deviant Decisions: Does Neutralization Still Play a Role?

    PDF

    2021 | Journal of the Association for Information Systems | Citations: 0

    Authors: Trinkle, Bradley; Warkentin, Merrill; Malimage, Kalana; Raddatz, Nirmalee

    Abstract: Extant research has shown that neutralization processes can enable potential IS ... Expand

    Semantic filters: general deterrence theory

    Topics: behavioral intention accounting IT career IT security threat accounting information system

    Methods: survey hierarchical linear modeling statistical hypothesis test experiment experimental design

    Theories: deterrence theory neutralization theory behavioral theory general deterrence theory protection motivation theory

  • Curbing cyberloafing: studying general and specific deterrence effects with field evidence

    PDF

    2021 | European Journal of Information Systems | Citations: 6

    Authors: Hensel, Przemysław G.; Kacprzak, Agnieszka

    Abstract: Although the General Deterrence Theory has frequently been employed to study the ... Expand

    Semantic filters: general deterrence theory

    Topics: electronic surveillance internet technology human resource management information system use wireless LAN

    Methods: longitudinal research qualitative interview time series analysis autoregressive integrated moving average autocorrelation analysis

    Theories: general deterrence theory

  • Why Individual Employees Commit Malicious Computer Abuse: A Routine Activity Theory Perspective

    PDF

    2020 | Journal of the Association for Information Systems | Citations: 13

    Authors: Luo, Xin (Robert); Li, Han; Hu, Qing; Xu, Heng

    Abstract: Prior information security studies have largely focused on understanding employe ... Expand

    Semantic filters: general deterrence theory

    Topics: self efficacy IT security threat data security usability security policy

    Methods: survey conjoint analysis PLS tool cross sectional research structural equation modeling

    Theories: activity theory social learning theory rational choice theory theory of planned behavior general deterrence theory

  • Taking it out on IT: A Mechanistic Model of Abusive Supervision and Computer Abuse

    2020 | HICSS | Citations: 1

    Authors: Nehme, Alaa; George, Joey F

    Abstract: One salient issue in organizational information security is computer abuse. Draw ... Expand

    Semantic filters: general deterrence theory

    Topics: IT security threat data security

    Methods: theory development

    Theories: appraisal theory neutralization theory deterrence theory general deterrence theory

  • The Influence of Professional Subculture on Information Security Policy Violations: A Field Study in a Healthcare Context

    PDF

    2020 | Information Systems Research | Citations: 14

    Authors: Sarkar, Sumantra; Vance, Anthony; Ramesh, Balasubramaniam; Demestihas, Menelaos; Wu, Daniel Thomas

    Abstract: In recent years, we have witnessed substantial increases in the frequency, scope ... Expand

    Semantic filters: general deterrence theory

    Topics: workstation national culture data security organizational context IT security training

    Methods: qualitative interview survey mixed method partial least squares regression survey design

    Theories: general deterrence theory theory of planned behavior