2023 | Americas Conference on Information Systems | Citations: 0
Authors: Ampel, Benjamin; Gao, Yang; Hu, James; Samtani, Sagar; Chen, Hsinchun
Abstract: Social engineering attacks are currently the most cited cybersecurity threat to ... Expand
Semantic filters: phishing
Topics: artificial intelligence electronic mail email phishing phishing IT security
Methods: word2vec random forest classification naïve bayes literature study pre-trained language model
2023 | International Conference on Information Systems | Citations: 0
Authors: Bera, Debalina; Kim, Dan
Abstract: This study investigates the effect of individuals' information processing modes ... Expand
Semantic filters: phishing
Topics: phishing mindfulness electronic mail email phishing data security
Methods: experiment survey partial least squares regression machine learning laboratory experiment
Theories: protection motivation theory
2023 | Decision Support Systems | Citations: 1
Authors: Bera, Debalina; Ogbanufe, Obi; Kim, Dan J.
Abstract: Despite anti-phishing filters, social engineering-based cyber-attacks still resu ... Expand
Semantic filters: phishing
Topics: phishing email phishing electronic mail email spam personalization
Methods: term frequency–inverse document frequency natural language processing topic model discriminant analysis literature study
2023 | Electronic Markets | Citations: 0
Authors: Bruckner, Moritz T.; Steininger, Dennis M.; Thatcher, Jason Bennett; Veit, Daniel J.
Abstract: Many firms use social media (SM) to solicit online investments. In this study, w ... Expand
Semantic filters: phishing
Topics: internet technology crowdfunding crowdsourcing Facebook blockchain
Methods: experimental group parametric test repeated measures ANOVA experimental design cross sectional research
Theories: signaling theory
2023 | HICSS | Citations: 0
Authors: Cram, W. Alec; D'Arcy, John
Abstract: A rich body of research examines the cybersecurity behavior of employees, with a ... Expand
Semantic filters: phishing
Topics: IT security data breach computer data storage cybersecurity behavior top management support
Methods: survey linguistic analysis company material
2023 | Journal of Management Information Systems | Citations: 0
Authors: Delkhosh, Fatemeh; Gopal, Ram D.; Patterson, Raymond A.; Yaraghi, Niam
Abstract: Incentivized blockchain-based online social media (BOSM), where creators and cur ... Expand
Semantic filters: phishing
Topics: social media user behavior application programming interface participatory design blockchain
Methods: longitudinal research theory development design methodology regression discontinuity design vector autoregression
2023 | Information & Management | Citations: 0
Authors: Fard Bahreini, Amir; Cavusoglu, Hasan; Cenfetelli, Ronald T.
Abstract: The increasing use of information technology artifacts in daily life makes secur ... Expand
Semantic filters: phishing
Topics: mobile application data security decision making self efficacy mobile application market
Methods: survey descriptive statistic structural equation modeling literature study post-hoc analysis
Theories: theory of bounded rationality
2023 | HICSS | Citations: 0
Authors: Faltermaier, Stefan; Strunk, Kim; Obermeier, Michaela; Fiedler, Marina
Abstract: Desirable user behavior is key to cyber security in organizations. However, a co ... Expand
Semantic filters: phishing
Topics: IT security user behavior information technology capability IT security defense password
Methods: qualitative interview personal interview qualitative coding grounded theory case study
2023 | Information & Management | Citations: 0
Authors: Frauenstein, Edwin Donald; Flowerday, Stephen; Mishi, Syden; Warkentin, Merrill
Abstract: Frequent and habitual engagement with social media can reinforce certain activit ... Expand
Semantic filters: phishing
Topics: phishing Facebook personality social media electronic mail
Methods: survey structural equation modeling survey design theory development self reported survey
Theories: big five model Maslow motivation theory uses and gratifications theory technology acceptance model theory of planned behavior
2023 | Americas Conference on Information Systems | Citations: 0
Authors: John, Asher; Patwary, Md Masum Ikbal; Park, Soomin; Zhao, Yu; Kwak, Dong-Heon
Abstract: Gamified training is often used to facilitate the adoption of complex informati ... Expand
Semantic filters: phishing
Topics: affordance user experience usability enterprise resource planning gamification
Methods: structural equation modeling survey simulation psychometrics data transformation
Theories: theory of affordance