Semantic Filter
show all semantic filters
Found 315 articles
  • Blockchain innovation for consent self-management in health information exchanges

    PDF

    2023 | Decision Support Systems | Citations: 0

    Authors: Anderson, Chad; Carvalho, Arthur; Kaul, Mala; Merhout, Jeffrey W.

    Abstract: With the increasing digitalization of health data, patients need to make informe ... Expand

    Semantic filters: password

    Topics: blockchain mobile application information exchange privacy Ethereum

    Methods: survey design artifact design science design process design principle

    Theories: evidence-based design

  • Design of a Novel Information System for Semi-automated Management of Cybersecurity in Industrial Control Systems

    PDF

    2023 | ACM Transactions on Management Information Systems | Citations: 0

    Authors: Ameri, Kimia; Hempel, Michael; Sharif, Hamid; Lopez, Juan; Perumalla, Kalyan

    Abstract: There is an urgent need in many critical infrastructure sectors, including the e ... Expand

    Semantic filters: password

    Topics: IT security database system website Python electronic authentication

    Methods: computational algorithm sentiment analysis natural language processing BERT language model

  • Are Information Security Practices Driven by the Likelihood and potential Impact of Security Events?

    2023 | Americas Conference on Information Systems | Citations: 0

    Authors: Batra, Gunjan; Saeed, Khawaja; Zafar, Humayun

    Abstract: Organizations have opened up various digital interfaces through which customers ... Expand

    Semantic filters: password

    Topics: electronic authentication cybersecurity behavior password online banking information security practice

    Methods: cluster analysis survey exploratory factor analysis data transformation descriptive statistic

  • Going Beyond Deterrence: A Middle-Range Theory of Motives and Controls for Insider Computer Abuse

    PDF

    2023 | Information Systems Research | Citations: 0

    Authors: Burns, A. J.; Roberts, Tom L.; Posey, Clay; Lowry, Paul Benjamin; Fuller, Bryan

    Abstract: Despite widespread agreement among practitioners and academicians that organizat ... Expand

    Semantic filters: password

    Topics: IT security data security anonymity organizational control password

    Methods: theory development partial least squares path modeling factor analysis data transformation PLS tool

    Theories: control theory deterrence theory

  • Barking Up the Wrong Tree? Reconsidering Policy Compliance as a Dependent Variable within Behavioral Cybersecurity Research

    2023 | HICSS | Citations: 0

    Authors: Cram, W. Alec; D'Arcy, John

    Abstract: A rich body of research examines the cybersecurity behavior of employees, with a ... Expand

    Semantic filters: password

    Topics: IT security data breach computer data storage cybersecurity behavior top management support

    Methods: survey linguistic analysis company material

  • Managing Organizational Cyber Security – The Distinct Role of Internalized Responsibility

    2023 | HICSS | Citations: 0

    Authors: Faltermaier, Stefan; Strunk, Kim; Obermeier, Michaela; Fiedler, Marina

    Abstract: Desirable user behavior is key to cyber security in organizations. However, a co ... Expand

    Semantic filters: password

    Topics: IT security user behavior information technology capability IT security defense password

    Methods: qualitative interview personal interview qualitative coding grounded theory case study

  • Roles of Peer Support and Perceived Organizational Support in Reducing Nonmalicious Information Security Violations: The Interacting Effect of Personal Goal Setting

    2023 | Americas Conference on Information Systems | Citations: 0

    Authors: Ifinedo, Princely

    Abstract: Nonmalicious information security violations (NISV) that employees engage in ca ... Expand

    Semantic filters: password

    Topics: IT security threat password information security policy compliance IT security website

    Methods: survey descriptive statistic partial least squares path modeling structural equation modeling

    Theories: social cognitive theory

  • Augmenting Password Strength Meter Design Using the Elaboration Likelihood Model: Evidence from Randomized Experiments

    PDF

    2023 | Information Systems Research | Citations: 0

    Authors: Khern-am-nuai, Warut; Hashim, Matthew J.; Pinsonneault, Alain; Yang, Weining; Li, Ninghui

    Abstract: Password-based authentication is the most commonly used method for gaining acces ... Expand

    Semantic filters: password

    Topics: password website data security electronic authentication application programming interface

    Methods: experiment survey laboratory experiment experimental group field experiment

    Theories: elaboration likelihood model

  • Formative Validity of A Novel Authentication Artifact for Augmented and Virtual Realities

    2023 | Americas Conference on Information Systems | Citations: 0

    Authors: Kreider, Christopher; El-Gayar, Omar

    Abstract: Augmented and virtual realities (AR/VR) have matured significantly in the past ... Expand

    Semantic filters: password

    Topics: electronic authentication usability password virtual reality IT security

    Methods: design science cognitive walkthrough design artifact

  • EXPLORING THREAT-SPECIFIC PRIVACY ASSURANCES IN THE CONTEXT OF CONNECTED VEHICLE APPLICATIONS

    2023 | European Conference On Information Systems | Citations: 0

    Authors: Lechte, Henrik; Menck, Jannes; Stocker, Alexander; Lembcke, Tim-Benjamin; Kolbe, Lutz

    Abstract: Connected vehicles enable a wide range of use cases, often facilitated by smart ... Expand

    Semantic filters: password

    Topics: privacy mobile application information privacy concern digital distribution mobile application market

    Methods: survey experiment parametric test nonparametric test one-way ANOVA

    Theories: protection motivation theory privacy calculus theory