2023 | Information & Management | Citations: 0
Authors: Fard Bahreini, Amir; Cavusoglu, Hasan; Cenfetelli, Ronald T.
Abstract: The increasing use of information technology artifacts in daily life makes secur ... Expand
Semantic filters: spyware
Topics: mobile application data security decision making self efficacy mobile application market
Methods: survey descriptive statistic structural equation modeling literature study post-hoc analysis
Theories: theory of bounded rationality
2023 | European Conference On Information Systems | Citations: 0
Authors: Frenzel-Piasentin, Adeline; Bruckner, Moritz; Wagner, Christina
Abstract: While social media has been a popular subject of prior research, we know little ... Expand
Semantic filters: spyware
Topics: social media technostress information system use spyware paywall
Methods: focus group theory development grounded theory qualitative coding business process modeling
Theories: flow theory action theory
2023 | Journal of Management Information Systems | Citations: 1
Authors: Samtani, Sagar; Zhu, Hongyi; Padmanabhan, Balaji; Chai, Yidong; Chen, Hsinchun; Nunamaker Jr., Jay F.
Abstract: Modern artificial intelligence (AI) is heavily reliant on deep learning (DL), an ... Expand
Semantic filters: spyware
Topics: knowledge base IT security artificial intelligence darknet IT security threat
Methods: Cross-Industry Standard Process for Data Mining data transformation autoencoder computational algorithm econometric modeling
2022 | Management Information Systems Quarterly | Citations: 0
Authors: Ebrahimi, Mohammadreza; Chai, Yidong; Samtani, Sagar; Chen, Hsinchun
Abstract: International dark web platforms operating within multiple geopolitical regions ... Expand
Semantic filters: spyware
Topics: darknet IT security knowledge sharing shapley additive explanation spoofing
Methods: machine learning design science design artifact case study deep learning
2021 | ACM SIGMIS Database | Citations: 0
Authors: Haag, Steffi; Siponen, Mikko; Liu, Fufan
Abstract: Protection motivation theory (PMT) is one of the most commonly used theories to ... Expand
Semantic filters: spyware
Topics: IT security threat IT security internet technology spyware cybersecurity behavior
Methods: ANOVA survey parametric test structured literature research bibliometric analysis
Theories: protection motivation theory
2021 | Information & Management | Citations: 0
Authors: Marett, Kent; Nabors, Misty
Abstract: The prevalence of security threats like ransomware continues to increase and vic ... Expand
Semantic filters: spyware
Topics: ransomware data security IT security IT security threat website
Methods: autocorrelation analysis analysis of covariance longitudinal research regression analysis method cluster analysis
2020 | International Journal of Information Management | Citations: 11
Authors: Donalds, Charlette; Osei-Bryson, Kweku-Muata
Abstract: Recent information and cybersecurity research have focused on improving individu ... Expand
Semantic filters: spyware
Topics: IT security self efficacy password decision making information system use
Methods: survey regression analysis method theory development decision tree classification data transformation
Theories: theory of abduction measurement theory
2020 | Americas Conference on Information Systems | Citations: 0
Authors: Marett, Kent; Nabors, Misty
Abstract: Ransomware is not only the bane of private businesses and publicly-traded compa ... Expand
Semantic filters: spyware
Topics: ransomware IT security threat IT security internet technology social media
Methods: analysis of covariance survey regression analysis method cross sectional survey digital trace data
2020 | ACM Transactions on Management Information Systems | Citations: 0
Authors: Pierazzi, Fabio; Mezzour, Ghita; Han, Qian; Colajanni, Michele; Subrahmanian, V. S.
Abstract: According to Nokia’s 2017 Threat Intelligence Report, 68.5% of malware targets t ... Expand
Semantic filters: spyware
Topics: spyware malware Android mobile application data breach
Methods: machine learning deep learning computational algorithm decision tree classification experiment
2020 | Communications of the Association for Information Systems | Citations: 0
Authors: Sharma, Shweta; Kumar, Naveen; Kumar, Rakesh; Krishna, C Rama
Abstract: The increase in the number of mobile devices that use the Android operating syst ... Expand
Semantic filters: spyware
Topics: malware computer virus protection Android mobile application ransomware
Methods: cluster analysis experiment machine learning computational algorithm literature study