Semantic Filter
show all semantic filters
Found 22 articles
  • The Future of Digital Platform Design - The Case of the EU Platform Regulation Discourse

    2023 | European Conference On Information Systems | Citations: 1

    Authors: Heimburg, Vincent; Schmitt, Julian; Wiesche, Manuel

    Abstract: Digital platform research focuses on the mechanisms in digital platform ecosyst ... Expand

    Semantic filters: single sign on

    Topics: digital ecosystem closed platform value creation participatory design electronic market

    Methods: qualitative coding design methodology qualitative content analysis memoing grounded theory

  • Not everything is a Metaverse?! A Practitioners Perspective on Characteriz- ing Metaverse Platforms

    2023 | HICSS | Citations: 0

    Authors: Schöbel, S.; Karatas, J.; Tingelhoff, F.; Leimeister, J.

    Abstract: Organizations claim to host what is called a metaverse-an extended version of o ... Expand

    Semantic filters: single sign on

    Topics: virtual reality Second Life virtual world IT security privacy

    Methods: qualitative interview theoretical contribution literature study design artifact survey

    Theories: organizational behavior theory

  • Usage Continuance in Software-as-a-Service

    PDF

    2022 | Information Systems Frontiers | Citations: 0

    Authors: Baumann, Elias; Kern, Jana; Lessmann, Stefan

    Abstract: Software-as-a-service applications are experiencing immense growth as their comp ... Expand

    Semantic filters: single sign on

    Topics: software as a service knowledge management usage intention single sign on intranet

    Methods: longitudinal research hierarchical linear modeling qualitative interview survey literature study

  • Mitigating the Security Intention-Behavior Gap: The Moderating Role of Required Effort on the Intention-Behavior Relationship

    PDF

    2021 | Journal of the Association for Information Systems | Citations: 0

    Authors: Jenkins, Jeffrey; Durcikova, Alexandra; Jay F. Nunamaker, Jr

    Abstract: Although users often express strong positive intentions to follow security polic ... Expand

    Semantic filters: single sign on

    Topics: security policy password data breach lean manufacturing IT security training

    Methods: experiment experimental group survey statistical hypothesis test regression analysis method

    Theories: theory of planned behavior protection motivation theory deterrence theory theory of bounded rationality

  • Design principles for learning analytics information systems in higher education

    PDF

    2021 | European Journal of Information Systems | Citations: 17

    Authors: Nguyen, Andy; Tuunanen, Tuure; Gardner, Lesley; Sheridan, Don

    Abstract: This paper reports a design science research (DSR) study that develops, demonstr ... Expand

    Semantic filters: single sign on

    Topics: online learning system decision making affordance digital dashboard anonymity

    Methods: design principle design artifact qualitative interview kernel theory survey

    Theories: theory of affordance learning theory

  • Towards the Design of a Student-Centered Question-Answering System in Educational Settings

    2021 | European Conference On Information Systems | Citations: 0

    Authors: Wambsganss, Thiemo; Haas, Leonie; Soellner, Matthias

    Abstract: Enrollments in distance-learning scenarios have been tremendously rising. Here, ... Expand

    Semantic filters: single sign on

    Topics: user requirement Python usability human computer interaction information retrieval

    Methods: design principle qualitative interview design artifact design science chatbot

    Theories: social response theory

  • A Cross-Country Investigation of User Connection Patterns in Online Social Networks

    2019 | HICSS | Citations: 0

    Authors: Bauer, Christine; Schedl, Markus

    Abstract: Given the global expansion, the borderless nature, and the social impact of soci ... Expand

    Semantic filters: single sign on

    Topics: Facebook social media recommender system application programming interface advertising management

    Methods: descriptive statistic literature study social network analysis computational algorithm

    Theories: cultural dimensions theory

  • A Longitudinal Study of Unauthorized Access Attempts on Information Systems: The Role of Opportunity Contexts

    PDF

    2019 | Management Information Systems Quarterly | Citations: 14

    Authors: Wang, Jingguo; Shan, Zhe; Gupta, Manish; Rao, H. Raghav

    Abstract: This study investigates employee behavior of unauthorized access attempts on inf ... Expand

    Semantic filters: single sign on

    Topics: insider threat data security mobile application internet technology single sign on

    Methods: instrumental variables estimation statistical hypothesis test regression analysis method descriptive statistic hierarchical linear modeling

    Theories: activity theory crime opportunity theory

  • When Do It Security Investments Matter? Accounting for the Influence of Institutional Factors in the Context of Healthcare Data Breaches

    2017 | Management Information Systems Quarterly | Citations: 118

    Authors: Angst, Corey M.; Block, Emily S.; D'Arcy, John; Kelley, Ken

    Abstract: In this study, we argue that institutional factors determine the extent to which ... Expand

    Semantic filters: single sign on

    Topics: IT security data breach health information system technology adoption database system

    Methods: theory development SEM tool conceptual modelling regression analysis method robustness check

    Theories: institutional theory

  • Development of Government-to-Employee Portals: A Developing Country Case Study

    2017 | Americas Conference on Information Systems | Citations: 0

    Authors: Larkotey, Winfred Ofoe; Effah, John; Boateng, Richard

    Abstract: The purpose of this study is to understand how social structures shape the devel ... Expand

    Semantic filters: single sign on

    Topics: government system systems development virtual workplace single sign on internet technology

    Methods: qualitative interview case study field study personal interview

    Theories: structuration theory