Semantic Filter
show all semantic filters
Found 36 articles
  • An Adversarial Dance: Toward an Understanding of Insiders’ Responses to Organizational Information Security Measures

    PDF

    2023 | Journal of the Association for Information Systems | Citations: 0

    Authors: Balozian, Puzant; Burns, A.; Leidner, Dorothy

    Abstract: Despite the increased focus on organizational security policies and programs, s ... Expand

    Semantic filters: neutralization theory

    Topics: IT security IT security defense productivity IT security threat anonymity

    Methods: case study qualitative interview personal interview theory development survey

    Theories: information systems theory neutralization theory behavioral theory

  • “This Is the Future of Advertising!” Or Is It? New Insights into the Justifiability of Deceptive Crowdwork in Cyberspace

    PDF

    2022 | HICSS | Citations: 0

    Authors: Kauppila, Santtu; Soliman, Wael

    Abstract: Unlike classical forms of deception where the deceiver deceives their victims di ... Expand

    Semantic filters: neutralization theory

    Topics: social media crowdsourcing social norm advertising management

    Methods: qualitative interview personal interview

    Theories: neutralization theory

  • How Do Individuals Justify and Rationalize their Criminal Behaviors in Online Romance Fraud?

    PDF

    2022 | Information Systems Frontiers | Citations: 0

    Authors: Offei, Martin; Andoh-Baidoo, Francis Kofi; Ayaburi, Emmanuel W.; Asamoah, David

    Abstract: Online romance fraud (ORF) is a growing concern with such serious negative conse ... Expand

    Semantic filters: neutralization theory

    Topics: criminality internet technology online dating internet fraud information security policy violation

    Methods: psychometrics structural equation modeling theory development data transformation SEM tool

    Theories: neutralization theory

  • New Insights into the Justifiability of Organizational Information Security Policy Noncompliance: A Case Study

    PDF

    2022 | HICSS | Citations: 0

    Authors: Soliman, Wael; Mohammadnazar, Hojat

    Abstract: Information security policies as apparatus for communicating security principles ... Expand

    Semantic filters: neutralization theory

    Topics: data security information system use anonymity IT security threat communication service infrastructure

    Methods: qualitative interview cross sectional research longitudinal research

    Theories: neutralization theory

  • Organizational Cybersecurity: Advanced Cyber Defense, Cyber Analytics, and Security Minitrack Overview

    2022 | HICSS | Citations: 0

    Authors: Steiner, Stuart; Plachkinova, Miloslava; Shepherd, Morgan; de Leon, Daniel Conte

    Abstract: Cybersecurity touches all aspects of organizational management, with organizatio ... Expand

    Semantic filters: neutralization theory

    Topics: IT security innovation management IT security threat digital innovation intrinsic motivation

    Methods: qualitative interview design artifact personal interview

    Theories: neutralization theory

  • Combatting the Neutralization of Security Policy Violations: Insights from the Healthcare Sector

    2021 | European Conference On Information Systems | Citations: 0

    Authors: Frank, Muriel

    Abstract: Employees who do not adhere to security policies and regulations are a major co ... Expand

    Semantic filters: neutralization theory

    Topics: information security policy violation data security IT security threat security policy organizational context

    Methods: survey factor analysis data transformation structural equation modeling chi squared test

    Theories: coordination theory neutralization theory

  • High-Risk Deviant Decisions: Does Neutralization Still Play a Role?

    PDF

    2021 | Journal of the Association for Information Systems | Citations: 0

    Authors: Trinkle, Bradley; Warkentin, Merrill; Malimage, Kalana; Raddatz, Nirmalee

    Abstract: Extant research has shown that neutralization processes can enable potential IS ... Expand

    Semantic filters: neutralization theory

    Topics: behavioral intention accounting IT career IT security threat accounting information system

    Methods: survey hierarchical linear modeling statistical hypothesis test experiment experimental design

    Theories: deterrence theory neutralization theory behavioral theory general deterrence theory protection motivation theory

  • Information security policy noncompliance: An integrative social influence model

    PDF

    2020 | Information Systems Journal | Citations: 12

    Authors: Gwebu, Kholekile L.; Wang, Jing; Hu, Michael Y.

    Abstract: Despite the significant advancements made in understanding the factors that driv ... Expand

    Semantic filters: neutralization theory

    Topics: data security financial performance anonymity internet technology electronic mail

    Methods: survey partial least squares path modeling theory development cross sectional research post-hoc analysis

    Theories: social information processing theory neutralization theory theory of reasoned action

  • Taking it out on IT: A Mechanistic Model of Abusive Supervision and Computer Abuse

    2020 | HICSS | Citations: 1

    Authors: Nehme, Alaa; George, Joey F

    Abstract: One salient issue in organizational information security is computer abuse. Draw ... Expand

    Semantic filters: neutralization theory

    Topics: IT security threat data security

    Methods: theory development

    Theories: appraisal theory neutralization theory deterrence theory general deterrence theory

  • Editorial: A Brief Retrospective (2013-2019)

    PDF

    2020 | Journal of the Association for Information Systems | Citations: 0

    Authors: Sarker, Suprateek; Palvia, Prashant; Oguz, Abdullah; Wu, Caven; Xiao, Xiao

    Abstract: ... Expand

    Semantic filters: neutralization theory

    Topics: privacy information system use systems design health information system electronic commerce

    Methods: literature sample theory development grounded theory design theory structured literature research

    Theories: privacy calculus theory technology acceptance model actor network theory general systems theory theory of affordance