2023 | European Journal of Information Systems | Citations: 0
Authors: Ngwenyama, Ojelanki; Henriksen, Helle Zinner; Hardt, Daniel
Abstract: The rise of the digital society is accompanied by incalculable social risks, but ... Expand
Semantic filters: IT risk management group participant
Topics: IT risk management data breach identity theft denial of service attack internet technology
Methods: theory development case study qualitative content analysis cluster analysis design artifact
Theories: theory of information warfare theory of communicative action
2022 | European Conference On Information Systems | Citations: 0
Authors: Arenas, Alvaro; Yazdi, Pouye
Abstract: Increased use of digital technologies by children has raised some concerns abou ... Expand
Semantic filters: IT risk management group participant
Topics: information system use IS maturity mobile phone social network Instagram
Methods: qualitative interview focus group qualitative coding grounded theory survey
2022 | Journal of Strategic Information Systems | Citations: 0
Authors: Bendig, David; Wagner, Robin; Jung, Christopher; Nüesch, Stephan
Abstract: Building on the concept of dynamic managerial capabilities, we set out to advanc ... Expand
Semantic filters: IT risk management group participant
Topics: Chief Information Officer IT leadership research and development information system use digital transformation
Methods: theory development longitudinal research regression analysis method descriptive statistic statistical hypothesis test
Theories: dynamic capabilities theory organizational behavior theory
2022 | Management Information Systems Quarterly | Citations: 0
Authors: Lee, Kyunghee; Han, Kunsoo; Animesh, Animesh; Pinsonneault, Alain
Abstract: Although researchers have examined the role of dyadic dynamics (i.e., interactio ... Expand
Semantic filters: IT risk management group participant
Topics: system integration Oracle database enterprise information system value creation IT decentralization
Methods: survey word2vec descriptive statistic word embedding theory development
2022 | Electronic Markets | Citations: 0
Authors: Ebrahimi, Sepideh; Eshghi, Kamran
Abstract: Concurrent with the increase in organizations’ reliance on IT systems for conduc ... Expand
Semantic filters: IT risk management group participant
Topics: IT security threat IT security IS failure IT risk management database system
Methods: meta analysis event study longitudinal research regression analysis method correlation analysis
2021 | Information & Management | Citations: 0
Authors: Chen, Rui; Kim, Dan J.; Rao, H. Raghav
Abstract: This study focuses on how social networking site (SNS) users’ perceived risk is ... Expand
Semantic filters: IT risk management group participant
Topics: privacy IT security threat Facebook information system use social network
Methods: survey post-hoc analysis partial least squares regression theory development conceptual modelling
Theories: role theory
2021 | Information & Management | Citations: 9
Authors: Li, Wanyun; Phang, Soon-Yeow; Choi, Ka Wai (Stanley); Ho, Shuk Ying
Abstract: Extending the literature on information technology control weaknesses (ITCWs), w ... Expand
Semantic filters: IT risk management group participant
Topics: Chief Information Officer accounting Sarbanes–Oxley Act LinkedIn logistics management
Methods: descriptive statistic archival research logistic regression regression analysis method propensity score matching
Theories: institutional theory
2021 | European Conference On Information Systems | Citations: 0
Authors: von Skarczinski, Bennet; Boll, Lukas; Teuteberg, Frank
Abstract: ... Expand
Semantic filters: IT risk management group participant
Topics: IT security outsourcing IT security threat innovation management legal context
Methods: qualitative interview survey regression analysis method descriptive statistic literature study
Theories: theory of everything
2020 | Americas Conference on Information Systems | Citations: 0
Authors: Sun, Chia-Ming; Wang, Yen-Yao; Yang, Chen-Bin
Abstract: This paper explores whether IT professionals and audit professionals have diffe ... Expand
Semantic filters: IT risk management group participant
Topics: data security IT workforce access control backup electronic mail
Methods: survey qualitative interview mixed method
2019 | Information Systems Frontiers | Citations: 9
Authors: Beydoun, Ghassan; Abedin, Babak; Merigó, José M.; Vera, Melanie
Abstract: Information Systems Frontiers is a leading international journal that publishes ... Expand
Semantic filters: IT risk management group participant
Topics: enterprise resource planning IT risk management internet of things frequency of use mobile system
Methods: bibliometric analysis qualitative content analysis co-citation analysis correlation analysis structural equation modeling