2023 | Journal of the Association for Information Systems | Citations: 0
Authors: Balozian, Puzant; Burns, A.; Leidner, Dorothy
Abstract: Despite the increased focus on organizational security policies and programs, s ... Expand
Semantic filters: neutralization theory
Topics: IT security IT security defense productivity IT security threat anonymity
Methods: case study qualitative interview personal interview theory development survey
Theories: information systems theory neutralization theory behavioral theory
2022 | HICSS | Citations: 0
Authors: Kauppila, Santtu; Soliman, Wael
Abstract: Unlike classical forms of deception where the deceiver deceives their victims di ... Expand
Semantic filters: neutralization theory
Topics: social media crowdsourcing social norm advertising management
Methods: qualitative interview personal interview
Theories: neutralization theory
2022 | Information Systems Frontiers | Citations: 0
Authors: Offei, Martin; Andoh-Baidoo, Francis Kofi; Ayaburi, Emmanuel W.; Asamoah, David
Abstract: Online romance fraud (ORF) is a growing concern with such serious negative conse ... Expand
Semantic filters: neutralization theory
Topics: criminality internet technology online dating internet fraud information security policy violation
Methods: psychometrics structural equation modeling theory development data transformation SEM tool
Theories: neutralization theory
2022 | HICSS | Citations: 0
Authors: Soliman, Wael; Mohammadnazar, Hojat
Abstract: Information security policies as apparatus for communicating security principles ... Expand
Semantic filters: neutralization theory
Topics: data security information system use anonymity IT security threat communication service infrastructure
Methods: qualitative interview cross sectional research longitudinal research
Theories: neutralization theory
2022 | HICSS | Citations: 0
Authors: Steiner, Stuart; Plachkinova, Miloslava; Shepherd, Morgan; de Leon, Daniel Conte
Abstract: Cybersecurity touches all aspects of organizational management, with organizatio ... Expand
Semantic filters: neutralization theory
Topics: IT security innovation management IT security threat digital innovation intrinsic motivation
Methods: qualitative interview design artifact personal interview
Theories: neutralization theory
2021 | European Conference On Information Systems | Citations: 0
Authors: Frank, Muriel
Abstract: Employees who do not adhere to security policies and regulations are a major co ... Expand
Semantic filters: neutralization theory
Topics: information security policy violation data security IT security threat security policy organizational context
Methods: survey factor analysis data transformation structural equation modeling chi squared test
Theories: coordination theory neutralization theory
2021 | Journal of the Association for Information Systems | Citations: 0
Authors: Trinkle, Bradley; Warkentin, Merrill; Malimage, Kalana; Raddatz, Nirmalee
Abstract: Extant research has shown that neutralization processes can enable potential IS ... Expand
Semantic filters: neutralization theory
Topics: behavioral intention accounting IT career IT security threat accounting information system
Methods: survey hierarchical linear modeling statistical hypothesis test experiment experimental design
Theories: deterrence theory neutralization theory behavioral theory general deterrence theory protection motivation theory
2020 | Information Systems Journal | Citations: 12
Authors: Gwebu, Kholekile L.; Wang, Jing; Hu, Michael Y.
Abstract: Despite the significant advancements made in understanding the factors that driv ... Expand
Semantic filters: neutralization theory
Topics: data security financial performance anonymity internet technology electronic mail
Methods: survey partial least squares path modeling theory development cross sectional research post-hoc analysis
Theories: social information processing theory neutralization theory theory of reasoned action
2020 | HICSS | Citations: 1
Authors: Nehme, Alaa; George, Joey F
Abstract: One salient issue in organizational information security is computer abuse. Draw ... Expand
Semantic filters: neutralization theory
Topics: IT security threat data security
Methods: theory development
Theories: appraisal theory neutralization theory deterrence theory general deterrence theory
2020 | Journal of the Association for Information Systems | Citations: 0
Authors: Sarker, Suprateek; Palvia, Prashant; Oguz, Abdullah; Wu, Caven; Xiao, Xiao
Abstract: ... Expand
Semantic filters: neutralization theory
Topics: privacy information system use systems design health information system electronic commerce
Methods: literature sample theory development grounded theory design theory structured literature research
Theories: privacy calculus theory technology acceptance model actor network theory general systems theory theory of affordance