2023 | Decision Support Systems | Citations: 0
Authors: Anderson, Chad; Carvalho, Arthur; Kaul, Mala; Merhout, Jeffrey W.
Abstract: With the increasing digitalization of health data, patients need to make informe ... Expand
Semantic filters: password
Topics: blockchain mobile application information exchange privacy Ethereum
Methods: survey design artifact design science design process design principle
Theories: evidence-based design
2023 | ACM Transactions on Management Information Systems | Citations: 0
Authors: Ameri, Kimia; Hempel, Michael; Sharif, Hamid; Lopez, Juan; Perumalla, Kalyan
Abstract: There is an urgent need in many critical infrastructure sectors, including the e ... Expand
Semantic filters: password
Topics: IT security database system website Python electronic authentication
Methods: computational algorithm sentiment analysis natural language processing BERT language model
2023 | Americas Conference on Information Systems | Citations: 0
Authors: Batra, Gunjan; Saeed, Khawaja; Zafar, Humayun
Abstract: Organizations have opened up various digital interfaces through which customers ... Expand
Semantic filters: password
Topics: electronic authentication cybersecurity behavior password online banking information security practice
Methods: cluster analysis survey exploratory factor analysis data transformation descriptive statistic
2023 | Information Systems Research | Citations: 0
Authors: Burns, A. J.; Roberts, Tom L.; Posey, Clay; Lowry, Paul Benjamin; Fuller, Bryan
Abstract: Despite widespread agreement among practitioners and academicians that organizat ... Expand
Semantic filters: password
Topics: IT security data security anonymity organizational control password
Methods: theory development partial least squares path modeling factor analysis data transformation PLS tool
Theories: control theory deterrence theory
2023 | HICSS | Citations: 0
Authors: Cram, W. Alec; D'Arcy, John
Abstract: A rich body of research examines the cybersecurity behavior of employees, with a ... Expand
Semantic filters: password
Topics: IT security data breach computer data storage cybersecurity behavior top management support
Methods: survey linguistic analysis company material
2023 | HICSS | Citations: 0
Authors: Faltermaier, Stefan; Strunk, Kim; Obermeier, Michaela; Fiedler, Marina
Abstract: Desirable user behavior is key to cyber security in organizations. However, a co ... Expand
Semantic filters: password
Topics: IT security user behavior information technology capability IT security defense password
Methods: qualitative interview personal interview qualitative coding grounded theory case study
2023 | Americas Conference on Information Systems | Citations: 0
Authors: Ifinedo, Princely
Abstract: Nonmalicious information security violations (NISV) that employees engage in ca ... Expand
Semantic filters: password
Topics: IT security threat password information security policy compliance IT security website
Methods: survey descriptive statistic partial least squares path modeling structural equation modeling
Theories: social cognitive theory
2023 | Information Systems Research | Citations: 0
Authors: Khern-am-nuai, Warut; Hashim, Matthew J.; Pinsonneault, Alain; Yang, Weining; Li, Ninghui
Abstract: Password-based authentication is the most commonly used method for gaining acces ... Expand
Semantic filters: password
Topics: password website data security electronic authentication application programming interface
Methods: experiment survey laboratory experiment experimental group field experiment
Theories: elaboration likelihood model
2023 | Americas Conference on Information Systems | Citations: 0
Authors: Kreider, Christopher; El-Gayar, Omar
Abstract: Augmented and virtual realities (AR/VR) have matured significantly in the past ... Expand
Semantic filters: password
Topics: electronic authentication usability password virtual reality IT security
Methods: design science cognitive walkthrough design artifact
2023 | European Conference On Information Systems | Citations: 0
Authors: Lechte, Henrik; Menck, Jannes; Stocker, Alexander; Lembcke, Tim-Benjamin; Kolbe, Lutz
Abstract: Connected vehicles enable a wide range of use cases, often facilitated by smart ... Expand
Semantic filters: password
Topics: privacy mobile application information privacy concern digital distribution mobile application market
Methods: survey experiment parametric test nonparametric test one-way ANOVA
Theories: protection motivation theory privacy calculus theory