Semantic Filter
show all semantic filters
Found 156 articles
  • The Interplay of Information Processing, Mindfulness, and Affective State in Phishing Detection

    2023 | International Conference on Information Systems | Citations: 0

    Authors: Bera, Debalina; Kim, Dan

    Abstract: This study investigates the effect of individuals' information processing modes ... Expand

    Semantic filters: malware

    Topics: phishing mindfulness electronic mail email phishing data security

    Methods: experiment survey partial least squares regression machine learning laboratory experiment

    Theories: protection motivation theory

  • A Genetic Algorithm Based Consensus Reaching Method on Malware Labels

    2023 | Americas Conference on Information Systems | Citations: 0

    Authors: Hsiao, Shun-Wen; Wang, Shih-Yu

    Abstract: In the field of cybersecurity, antivirus vendors produce malware labels, known ... Expand

    Semantic filters: malware

    Topics: malware

    Methods: computational algorithm experiment

  • Visualizing Convolutional Neural Network Models’ Sensitivity to Nonnatural Data Order

    PDF

    2023 | Information Systems Frontiers | Citations: 0

    Authors: Klepetko, Randy; Krishnan, Ram

    Abstract: Convolutional neural networks (CNN) have revolutionized image recognition techno ... Expand

    Semantic filters: malware

    Topics: malware mobile system cloud computing infrastructure as a service

    Methods: experiment descriptive statistic machine learning computational algorithm Keras

  • The effects of knowledge mechanisms on employees' information security threat construal

    PDF

    2023 | Information Systems Journal | Citations: 1

    Authors: Mady, Ashraf; Gupta, Saurabh; Warkentin, Merrill

    Abstract: Organisations implement a variety of knowledge mechanisms such as information se ... Expand

    Semantic filters: malware

    Topics: data security email phishing security policy IT security task complexity

    Methods: survey experiment Student's t-test parametric test survey design

    Theories: construal level theory security compliance theory

  • Applying Dispositional, Situational, and Organizational Risk Propensity to Technology Threat Avoidance Theory - A tripartite View

    2023 | European Conference On Information Systems | Citations: 0

    Authors: Pfaff, Theresa; Nastjuk, Ilja; Matschak, Tizian

    Abstract: Human error is one of the biggest cybersecurity vulnerabilities in organization ... Expand

    Semantic filters: malware

    Topics: electronic mail self efficacy malware website IT security

    Methods: survey experiment PLS tool partial least squares path modeling computational algorithm

    Theories: technology threat avoidance theory

  • Towards Adversarially Superior Malware Detection Models: An Adversary Aware Proactive Approach using Adversarial Attacks and Defenses

    PDF

    2023 | Information Systems Frontiers | Citations: 1

    Authors: Rathore, Hemant; Samavedhi, Adithya; Sahay, Sanjay K.; Sewak, Mohit

    Abstract: The android ecosystem (smartphones, tablets, etc.) has grown manifold in the las ... Expand

    Semantic filters: malware

    Topics: malware Android mobile application database system Google+

    Methods: machine learning artificial neural network computational algorithm deep learning descriptive statistic

  • What are the trend and core knowledge of information security? A citation and co-citation analysis

    PDF

    2023 | Information & Management | Citations: 0

    Authors: Shiau, Wen-Lung; Wang, Xiaoqun; Zheng, Fei

    Abstract: Information technology brings business success opportunities, but also causes po ... Expand

    Semantic filters: malware

    Topics: privacy decision making intrusion detection system malware database system

    Methods: co-citation analysis cluster analysis literature sample hierarchical clustering multidimensional scaling

  • Protection Motivation Theory in Information Security Behavior Research: Reconsidering the Fundamentals

    2023 | Communications of the Association for Information Systems | Citations: 0

    Authors: Siponen, Mikko; Rönkkö, Mikko; Fufan, Liu; Haag, Steffi; Laatikainen, Gabriella

    Abstract: Scholars commonly use protection motivation theory (PMT) by Rogers to examine i ... Expand

    Semantic filters: malware

    Topics: malware data security behavioral intention self efficacy social influence

    Methods: functional magnetic resonance imaging literature study experiment experimental group structural equation modeling

    Theories: protection motivation theory technology threat avoidance theory

  • HOW PARTS CONNECT TO WHOLE IN BUILDING DIGITAL GENERATIVITY IN DIGITAL PLATFORM ECOSYSTEMS

    2023 | European Conference On Information Systems | Citations: 0

    Authors: Sun, Jiamei; Xu, Dongming; Karanasios, Stan

    Abstract: Generativity drives digital innovation and platform growth by engaging many oth ... Expand

    Semantic filters: malware

    Topics: innovation management digital ecosystem digital innovation digital platform technological change

    Methods: business process modeling qualitative content analysis literature sample grounded theory applicability check

  • Customer Cybersecurity and Supplier Cost Management Strategy

    2023 | International Conference on Information Systems | Citations: 0

    Authors: Yang, Xu; Liang, Peng; Hu, Nan; Xue, Fujing

    Abstract: In this paper, we explore the spillover effect of customer firms' data breaches ... Expand

    Semantic filters: malware

    Topics: data breach strategic management national culture supply chain management database system

    Methods: descriptive statistic ordinary least square natural experiment longitudinal research difference in differences

    Theories: cultural dimensions theory