2023 | International Conference on Information Systems | Citations: 0
Authors: Bera, Debalina; Kim, Dan
Abstract: This study investigates the effect of individuals' information processing modes ... Expand
Semantic filters: malware
Topics: phishing mindfulness electronic mail email phishing data security
Methods: experiment survey partial least squares regression machine learning laboratory experiment
Theories: protection motivation theory
2023 | Americas Conference on Information Systems | Citations: 0
Authors: Hsiao, Shun-Wen; Wang, Shih-Yu
Abstract: In the field of cybersecurity, antivirus vendors produce malware labels, known ... Expand
Semantic filters: malware
Topics: malware
Methods: computational algorithm experiment
2023 | Information Systems Frontiers | Citations: 0
Authors: Klepetko, Randy; Krishnan, Ram
Abstract: Convolutional neural networks (CNN) have revolutionized image recognition techno ... Expand
Semantic filters: malware
Topics: malware mobile system cloud computing infrastructure as a service
Methods: experiment descriptive statistic machine learning computational algorithm Keras
2023 | Information Systems Journal | Citations: 1
Authors: Mady, Ashraf; Gupta, Saurabh; Warkentin, Merrill
Abstract: Organisations implement a variety of knowledge mechanisms such as information se ... Expand
Semantic filters: malware
Topics: data security email phishing security policy IT security task complexity
Methods: survey experiment Student's t-test parametric test survey design
Theories: construal level theory security compliance theory
2023 | European Conference On Information Systems | Citations: 0
Authors: Pfaff, Theresa; Nastjuk, Ilja; Matschak, Tizian
Abstract: Human error is one of the biggest cybersecurity vulnerabilities in organization ... Expand
Semantic filters: malware
Topics: electronic mail self efficacy malware website IT security
Methods: survey experiment PLS tool partial least squares path modeling computational algorithm
Theories: technology threat avoidance theory
2023 | Information Systems Frontiers | Citations: 1
Authors: Rathore, Hemant; Samavedhi, Adithya; Sahay, Sanjay K.; Sewak, Mohit
Abstract: The android ecosystem (smartphones, tablets, etc.) has grown manifold in the las ... Expand
Semantic filters: malware
Topics: malware Android mobile application database system Google+
Methods: machine learning artificial neural network computational algorithm deep learning descriptive statistic
2023 | Information & Management | Citations: 0
Authors: Shiau, Wen-Lung; Wang, Xiaoqun; Zheng, Fei
Abstract: Information technology brings business success opportunities, but also causes po ... Expand
Semantic filters: malware
Topics: privacy decision making intrusion detection system malware database system
Methods: co-citation analysis cluster analysis literature sample hierarchical clustering multidimensional scaling
2023 | Communications of the Association for Information Systems | Citations: 0
Authors: Siponen, Mikko; Rönkkö, Mikko; Fufan, Liu; Haag, Steffi; Laatikainen, Gabriella
Abstract: Scholars commonly use protection motivation theory (PMT) by Rogers to examine i ... Expand
Semantic filters: malware
Topics: malware data security behavioral intention self efficacy social influence
Methods: functional magnetic resonance imaging literature study experiment experimental group structural equation modeling
Theories: protection motivation theory technology threat avoidance theory
2023 | European Conference On Information Systems | Citations: 0
Authors: Sun, Jiamei; Xu, Dongming; Karanasios, Stan
Abstract: Generativity drives digital innovation and platform growth by engaging many oth ... Expand
Semantic filters: malware
Topics: innovation management digital ecosystem digital innovation digital platform technological change
Methods: business process modeling qualitative content analysis literature sample grounded theory applicability check
2023 | International Conference on Information Systems | Citations: 0
Authors: Yang, Xu; Liang, Peng; Hu, Nan; Xue, Fujing
Abstract: In this paper, we explore the spillover effect of customer firms' data breaches ... Expand
Semantic filters: malware
Topics: data breach strategic management national culture supply chain management database system
Methods: descriptive statistic ordinary least square natural experiment longitudinal research difference in differences
Theories: cultural dimensions theory