2023 | Journal of Management Information Systems | Citations: 0
Authors: Qahri-Saremi, Hamed; Turel, Ofir
Abstract: User susceptibility to phishing messages on social media is a growing informatio ... Expand
Semantic filters: phishing website
Topics: social media phishing armed conflict decision making user behavior
Methods: experiment regression analysis method delphi study analysis of covariance mixed method
Theories: big five model dual-system theory
2023 | Management Information Systems Quarterly | Citations: 0
Authors: Wright, Ryan; Johnson, Steven; Kitchens, Brent
Abstract: Despite widespread awareness of risks, significant investments in cybersecurity ... Expand
Semantic filters: phishing website
Topics: phishing electronic mail system support IT security email phishing
Methods: theory development literature study simulation logistic regression survey
2022 | Decision Support Systems | Citations: 0
Authors: Gopal, Ram D.; Hojati, Afrouz; Patterson, Raymond A.
Abstract: Third-party websites or applications are the key entities in the web eco-system ... Expand
Semantic filters: phishing website
Topics: website phishing website electronic commerce advertising management fake news
Methods: machine learning classification method data modeling ensemble learning computational algorithm
2022 | ACM Transactions on Management Information Systems | Citations: 0
Authors: Xie, Jiaheng; Zhang, Bin; Ma, Jian; Zeng, Daniel; Lo-Ciganic, Jenny
Abstract: Hospital readmission refers to the situation where a patient is re-hospitalized ... Expand
Semantic filters: phishing website
Topics: health information system healthcare data online learning system crowdsourcing crowdfunding
Methods: machine learning deep learning logistic regression support vector machine experimental group
2021 | Information Systems Research | Citations: 17
Authors: Abbasi, Ahmed; Dobolyi, David; Vance, Anthony; Zahedi, Fatemeh Mariam
Abstract: Phishing is a significant security concern for organizations, threatening employ ... Expand
Semantic filters: phishing website
Topics: phishing electronic mail phishing website website cost benefit analysis
Methods: survey experiment field experiment machine learning longitudinal research
Theories: technology acceptance model protection motivation theory
2021 | Information & Management | Citations: 0
Authors: Chen, Yan; Zahedi, Fatemeh Mariam; Abbasi, Ahmed; Dobolyi, David
Abstract: Phishing websites become a critical cybersecurity threat affecting individuals a ... Expand
Semantic filters: phishing website
Topics: phishing website website usage intention online banking IT security
Methods: experiment laboratory experiment structural equation modeling kernel theory factor analysis
2021 | Information Systems Journal | Citations: 0
Authors: Jaeger, Lennart; Eckhardt, Andreas
Abstract: Most contemporary studies on information security focus on largely static phenom ... Expand
Semantic filters: phishing website
Topics: cybersecurity awareness phishing electronic mail email phishing IT security threat
Methods: oculometry experiment survey partial least squares regression statistical power analysis
Theories: protection motivation theory big five model
2021 | Journal of the Association for Information Systems | Citations: 11
Authors: Siering, Michael; Muntermann, Jan; Grčar, Miha
Abstract: We address the challenge of building an automated fraud detection system with ro ... Expand
Semantic filters: phishing website
Topics: fraud detection marketing management problem solving advertising management evaluation criteria
Methods: design principle design requirement ensemble learning machine learning kernel theory
Theories: marketing theory
2020 | Decision Support Systems | Citations: 24
Authors: Chen, Rui; Gaia, Joana; Rao, H. Raghav
Abstract: This paper examines online users' perceived susceptibility to phishing attacks. ... Expand
Semantic filters: phishing website
Topics: phishing electronic mail decision making internet technology email phishing
Methods: survey descriptive statistic partial least squares regression machine learning structural equation modeling
Theories: expectation confirmation theory
2020 | ACM Transactions on Management Information Systems | Citations: 0
Authors: Gopal, Ram D.; Hidaji, Hooman; Kutlu, Sule Nur; Patterson, Raymond A.; Rolland, Erik; Zhdanov, Dmitry
Abstract: Untrustworthy content such as fake news and clickbait have become a pervasive pr ... Expand
Semantic filters: phishing website
Topics: website fake news supply chain management business model ease of use
Methods: support vector machine machine learning k-means clustering classification method ensemble learning