Semantic Filter
show all semantic filters
Found 54 articles
  • PUBLIC MANAGEMENT CHALLENGES IN THE DIGITAL RISK SOCIETY: A Critical Analysis of the Public Debate on Implementation of the Danish NemID

    PDF

    2023 | European Journal of Information Systems | Citations: 0

    Authors: Ngwenyama, Ojelanki; Henriksen, Helle Zinner; Hardt, Daniel

    Abstract: The rise of the digital society is accompanied by incalculable social risks, but ... Expand

    Semantic filters: IT risk management group participant

    Topics: IT risk management data breach identity theft denial of service attack internet technology

    Methods: theory development case study qualitative content analysis cluster analysis design artifact

    Theories: theory of information warfare theory of communicative action

  • TOWARDS A MODEL OF TECHNOLOGY USAGE AND DIGITAL MATURITY IN CHILDREN: A GROUNDED-THEORY APPROACH

    2022 | European Conference On Information Systems | Citations: 0

    Authors: Arenas, Alvaro; Yazdi, Pouye

    Abstract: Increased use of digital technologies by children has raised some concerns abou ... Expand

    Semantic filters: IT risk management group participant

    Topics: information system use IS maturity mobile phone social network Instagram

    Methods: qualitative interview focus group qualitative coding grounded theory survey

  • When and why technology leadership enters the C-suite: An antecedents perspective on CIO presence

    PDF

    2022 | Journal of Strategic Information Systems | Citations: 0

    Authors: Bendig, David; Wagner, Robin; Jung, Christopher; Nüesch, Stephan

    Abstract: Building on the concept of dynamic managerial capabilities, we set out to advanc ... Expand

    Semantic filters: IT risk management group participant

    Topics: Chief Information Officer IT leadership research and development information system use digital transformation

    Methods: theory development longitudinal research regression analysis method descriptive statistic statistical hypothesis test

    Theories: dynamic capabilities theory organizational behavior theory

  • Does IT Matter to Acquisitions? The Impacts of IT Distance on Post-Acquisition Performance

    2022 | Management Information Systems Quarterly | Citations: 0

    Authors: Lee, Kyunghee; Han, Kunsoo; Animesh, Animesh; Pinsonneault, Alain

    Abstract: Although researchers have examined the role of dyadic dynamics (i.e., interactio ... Expand

    Semantic filters: IT risk management group participant

    Topics: system integration Oracle database enterprise information system value creation IT decentralization

    Methods: survey word2vec descriptive statistic word embedding theory development

  • A meta-analysis of the factors influencing the impact of security breach announcements on stock returns of firms

    PDF

    2022 | Electronic Markets | Citations: 0

    Authors: Ebrahimi, Sepideh; Eshghi, Kamran

    Abstract: Concurrent with the increase in organizations’ reliance on IT systems for conduc ... Expand

    Semantic filters: IT risk management group participant

    Topics: IT security threat IT security IS failure IT risk management database system

    Methods: meta analysis event study longitudinal research regression analysis method correlation analysis

  • A study of social networking site use from a three-pronged security and privacy threat assessment perspective

    PDF

    2021 | Information & Management | Citations: 0

    Authors: Chen, Rui; Kim, Dan J.; Rao, H. Raghav

    Abstract: This study focuses on how social networking site (SNS) users’ perceived risk is ... Expand

    Semantic filters: IT risk management group participant

    Topics: privacy IT security threat Facebook information system use social network

    Methods: survey post-hoc analysis partial least squares regression theory development conceptual modelling

    Theories: role theory

  • The strategic role of CIOs in IT controls: IT control weaknesses and CIO turnover

    PDF

    2021 | Information & Management | Citations: 9

    Authors: Li, Wanyun; Phang, Soon-Yeow; Choi, Ka Wai (Stanley); Ho, Shuk Ying

    Abstract: Extending the literature on information technology control weaknesses (ITCWs), w ... Expand

    Semantic filters: IT risk management group participant

    Topics: Chief Information Officer accounting Sarbanes–Oxley Act LinkedIn logistics management

    Methods: descriptive statistic archival research logistic regression regression analysis method propensity score matching

    Theories: institutional theory

  • Understanding the adoption of cyber insurance for residual risks - An empirical large-scale survey on organizational factors of the demand side

    2021 | European Conference On Information Systems | Citations: 0

    Authors: von Skarczinski, Bennet; Boll, Lukas; Teuteberg, Frank

    Abstract: ... Expand

    Semantic filters: IT risk management group participant

    Topics: IT security outsourcing IT security threat innovation management legal context

    Methods: qualitative interview survey regression analysis method descriptive statistic literature study

    Theories: theory of everything

  • Information Security Assurance and the Role of Security Configuration Management from Substantive and Symbolic Perspectives

    2020 | Americas Conference on Information Systems | Citations: 0

    Authors: Sun, Chia-Ming; Wang, Yen-Yao; Yang, Chen-Bin

    Abstract: This paper explores whether IT professionals and audit professionals have diffe ... Expand

    Semantic filters: IT risk management group participant

    Topics: data security IT workforce access control backup electronic mail

    Methods: survey qualitative interview mixed method

  • Twenty Years of Information Systems Frontiers

    PDF

    2019 | Information Systems Frontiers | Citations: 9

    Authors: Beydoun, Ghassan; Abedin, Babak; Merigó, José M.; Vera, Melanie

    Abstract: Information Systems Frontiers is a leading international journal that publishes ... Expand

    Semantic filters: IT risk management group participant

    Topics: enterprise resource planning IT risk management internet of things frequency of use mobile system

    Methods: bibliometric analysis qualitative content analysis co-citation analysis correlation analysis structural equation modeling