Semantic Filter
show all semantic filters
Found 61 articles
  • How “What you think you know about cybersecurity” can help users make more secure decisions

    PDF

    2023 | Information & Management | Citations: 0

    Authors: Fard Bahreini, Amir; Cavusoglu, Hasan; Cenfetelli, Ronald T.

    Abstract: The increasing use of information technology artifacts in daily life makes secur ... Expand

    Semantic filters: spyware

    Topics: mobile application data security decision making self efficacy mobile application market

    Methods: survey descriptive statistic structural equation modeling literature study post-hoc analysis

    Theories: theory of bounded rationality

  • A Flow-Oriented Process Model of Social Media Services Use

    2023 | European Conference On Information Systems | Citations: 0

    Authors: Frenzel-Piasentin, Adeline; Bruckner, Moritz; Wagner, Christina

    Abstract: While social media has been a popular subject of prior research, we know little ... Expand

    Semantic filters: spyware

    Topics: social media technostress information system use spyware paywall

    Methods: focus group theory development grounded theory qualitative coding business process modeling

    Theories: flow theory action theory

  • Deep Learning for Information Systems Research

    PDF

    2023 | Journal of Management Information Systems | Citations: 1

    Authors: Samtani, Sagar; Zhu, Hongyi; Padmanabhan, Balaji; Chai, Yidong; Chen, Hsinchun; Nunamaker Jr., Jay F.

    Abstract: Modern artificial intelligence (AI) is heavily reliant on deep learning (DL), an ... Expand

    Semantic filters: spyware

    Topics: knowledge base IT security artificial intelligence darknet IT security threat

    Methods: Cross-Industry Standard Process for Data Mining data transformation autoencoder computational algorithm econometric modeling

  • Cross-Lingual Cybersecurity Analytics in the International Dark Web with Adversarial Deep Representation Learning

    2022 | Management Information Systems Quarterly | Citations: 0

    Authors: Ebrahimi, Mohammadreza; Chai, Yidong; Samtani, Sagar; Chen, Hsinchun

    Abstract: International dark web platforms operating within multiple geopolitical regions ... Expand

    Semantic filters: spyware

    Topics: darknet IT security knowledge sharing shapley additive explanation spoofing

    Methods: machine learning design science design artifact case study deep learning

  • Protection Motivation Theory in Information Systems Security Research: A Review of the Past and a Road Map for the Future

    PDF

    2021 | ACM SIGMIS Database | Citations: 0

    Authors: Haag, Steffi; Siponen, Mikko; Liu, Fufan

    Abstract: Protection motivation theory (PMT) is one of the most commonly used theories to ... Expand

    Semantic filters: spyware

    Topics: IT security threat IT security internet technology spyware cybersecurity behavior

    Methods: ANOVA survey parametric test structured literature research bibliometric analysis

    Theories: protection motivation theory

  • Local learning from municipal ransomware attacks: A geographically weighted analysis

    PDF

    2021 | Information & Management | Citations: 0

    Authors: Marett, Kent; Nabors, Misty

    Abstract: The prevalence of security threats like ransomware continues to increase and vic ... Expand

    Semantic filters: spyware

    Topics: ransomware data security IT security IT security threat website

    Methods: autocorrelation analysis analysis of covariance longitudinal research regression analysis method cluster analysis

  • Cybersecurity compliance behavior: Exploring the influences of individual decision style and other antecedents

    PDF

    2020 | International Journal of Information Management | Citations: 11

    Authors: Donalds, Charlette; Osei-Bryson, Kweku-Muata

    Abstract: Recent information and cybersecurity research have focused on improving individu ... Expand

    Semantic filters: spyware

    Topics: IT security self efficacy password decision making information system use

    Methods: survey regression analysis method theory development decision tree classification data transformation

    Theories: theory of abduction measurement theory

  • Local Learning from Municipal Ransomware Attacks

    2020 | Americas Conference on Information Systems | Citations: 0

    Authors: Marett, Kent; Nabors, Misty

    Abstract: Ransomware is not only the bane of private businesses and publicly-traded compa ... Expand

    Semantic filters: spyware

    Topics: ransomware IT security threat IT security internet technology social media

    Methods: analysis of covariance survey regression analysis method cross sectional survey digital trace data

  • A Data-driven Characterization of Modern Android Spyware

    PDF

    2020 | ACM Transactions on Management Information Systems | Citations: 0

    Authors: Pierazzi, Fabio; Mezzour, Ghita; Han, Qian; Colajanni, Michele; Subrahmanian, V. S.

    Abstract: According to Nokia’s 2017 Threat Intelligence Report, 68.5% of malware targets t ... Expand

    Semantic filters: spyware

    Topics: spyware malware Android mobile application data breach

    Methods: machine learning deep learning computational algorithm decision tree classification experiment

  • The Paradox of Choice: Investigating Selection Strategies for Android Malware Datasets Using a Machine-learning Approach

    2020 | Communications of the Association for Information Systems | Citations: 0

    Authors: Sharma, Shweta; Kumar, Naveen; Kumar, Rakesh; Krishna, C Rama

    Abstract: The increase in the number of mobile devices that use the Android operating syst ... Expand

    Semantic filters: spyware

    Topics: malware computer virus protection Android mobile application ransomware

    Methods: cluster analysis experiment machine learning computational algorithm literature study