Semantic Filter
show all semantic filters
Found 72 articles
  • Vulnerability-based Cyber-Risk Management: A Text-mining Approach

    2023 | Americas Conference on Information Systems | Citations: 0

    Authors: Jain, Swati; Mukhopadhyay, Arunabha

    Abstract: Vulnerable information systems inside an organization make it prone to cyber-at ... Expand

    Semantic filters: rational choice theory

    Topics: IT security threat risk management IT security Microsoft Windows Chief Information Officer

    Methods: topic model decision tree classification naïve bayes machine learning experiment

    Theories: rational choice theory protection motivation theory

  • Deepfake Valence: A Double-edged Sword

    2023 | Americas Conference on Information Systems | Citations: 0

    Authors: Liang, Huigang; Chew, Shao

    Abstract: Deepfakes have garnered widespread attention for their malicious use. Despite i ... Expand

    Semantic filters: rational choice theory

    Topics: deepfake social norm technology adoption computer crime

    Methods: SEM tool survey statistical hypothesis test scale reliability field study

    Theories: rational choice theory big five model

  • A Taxonomy for Risk Assessment of Cyberattacks on Critical Infrastructure (TRACI)

    PDF

    2023 | Communications of the Association for Information Systems | Citations: 0

    Authors: Plachkinova, Miloslava; Vо, Ace

    Abstract: Cybercrime against critical infrastructures such as nuclear reactors, power pla ... Expand

    Semantic filters: rational choice theory

    Topics: IT security risk management usability data security strategic management

    Methods: qualitative interview survey design science personal interview design artifact

    Theories: rational choice theory activity theory information systems theory utility theory

  • Adoption of enterprise mobile systems – An alternative theoretical perspective

    PDF

    2022 | International Journal of Information Management | Citations: 0

    Authors: Choudhary, Praveen K.; Routray, Susmi; Upadhyay, Parijat; Pani, A.K.

    Abstract: Enterprises nudge the usage of mobile devices to ensure business continuity, alt ... Expand

    Semantic filters: rational choice theory

    Topics: mobile system task productivity data security privacy IT policy

    Methods: qualitative interview mixed method survey partial least squares path modeling data transformation

    Theories: construal level theory rational choice theory

  • The interaction of dark traits with the perceptions of apprehension

    PDF

    2022 | HICSS | Citations: 0

    Authors: Gaia, Joana; Murray, David; Sanders, George; Sanders, Sean; Upadhyaya, Shambhu; Wang, Xunyi; Yoo, Chul

    Abstract: This paper integrates dark personality traits with the economics of crime and ra ... Expand

    Semantic filters: rational choice theory

    Topics: criminality Health Insurance Portability and Accountability Act personality information privacy law computer crime

    Methods: survey partial least squares regression PLS tool

    Theories: rational choice theory

  • Guest editorial: Re-imagining diffusion and adoption of emerging technologies

    PDF

    2022 | International Journal of Information Management | Citations: 0

    Authors: Sharma, Sujeet Kumar; De, Rahul; Jeyaraj, Anand; Raman, Ramakrishnan

    Abstract: ... Expand

    Semantic filters: rational choice theory

    Topics: artificial intelligence word of mouth social presence

    Methods: theoretical contribution mixed method literature sample partial least squares path modeling

    Theories: work systems theory construal level theory rational choice theory

  • Protecting Organizational Information Assets: Exploring the Influence of Regulatory Focus on Rational Choices

    PDF

    2021 | HICSS | Citations: 0

    Authors: Burns, Aj

    Abstract: Protecting organizational information assets is an essential objective for most ... Expand

    Semantic filters: rational choice theory

    Topics: data security information security practice IT security cybersecurity behavior anonymity

    Methods: PLS tool partial least squares regression mediation analysis self reported survey theoretical contribution

    Theories: regulatory focus theory rational choice theory

  • Investigating the Impact of Organizational Culture on Information Security Policy Compliance: The Case of Ethiopia.

    2021 | Americas Conference on Information Systems | Citations: 0

    Authors: Ejigu, Kibrom; Siponen, Mikko; Arage, Tilahun

    Abstract: Information security is one of the organizations' top agendas worldwide. Simila ... Expand

    Semantic filters: rational choice theory

    Topics: organizational culture data security national culture security policy

    Methods: structural equation modeling survey SEM tool qualitative interview

    Theories: rational choice theory

  • What drives consumers to adopt a sharing platform: An integrated model of value-based and transaction cost theories

    PDF

    2021 | Information & Management | Citations: 0

    Authors: Liang, Ting-Peng; Lin, Yi-Ling; Hou, Hsiao-Chi

    Abstract: The sharing economy has become a source of innovation in recent years. However, ... Expand

    Semantic filters: rational choice theory

    Topics: sharing platform asset specificity usage intention website decision making

    Methods: experiment survey parametric test Student's t-test partial least squares regression

    Theories: transaction cost economics unified theory of acceptance and use of technology technology acceptance model cognitive evaluation theory rational choice theory

  • Bitcoin investment: a mixed methods study of investment motivations

    PDF

    2021 | European Journal of Information Systems | Citations: 11

    Authors: Mattke, Jens; Maier, Christian; Reis, Lea; Weitzel, Tim

    Abstract: Bitcoin is a well-established blockchain-based cryptocurrency that has attracted ... Expand

    Semantic filters: rational choice theory

    Topics: Bitcoin crowdsourcing crowdfunding blockchain cryptocurrency

    Methods: qualitative interview mixed method survey triangulation design artifact

    Theories: regret theory fuzzy set theory theory of abduction set theory rational choice theory