Semantic Filter
show all semantic filters
Found 12 articles
  • PUBLIC MANAGEMENT CHALLENGES IN THE DIGITAL RISK SOCIETY: A Critical Analysis of the Public Debate on Implementation of the Danish NemID

    PDF

    2023 | European Journal of Information Systems | Citations: 0

    Authors: Ngwenyama, Ojelanki; Henriksen, Helle Zinner; Hardt, Daniel

    Abstract: The rise of the digital society is accompanied by incalculable social risks, but ... Expand

    Semantic filters: theory of information warfare

    Topics: IT risk management data breach identity theft denial of service attack internet technology

    Methods: theory development case study qualitative content analysis cluster analysis design artifact

    Theories: theory of information warfare theory of communicative action

  • From Facebook to the Streets: Russian Troll Ads and Black Lives Matter Protests

    2019 | HICSS | Citations: 2

    Authors: Etudo, Ugochukwu; Yoon, Victoria; Yaraghi, Niam

    Abstract: Online trolling is typically studied in the IS literature as an uncoordinated, a ... Expand

    Semantic filters: theory of information warfare

    Topics: Facebook application programming interface missing data internet technology Python

    Methods: topic model time series analysis longitudinal research term frequency–inverse document frequency data transformation

    Theories: theory of information warfare

  • The Ethics of Psychometrics in Social Media: A Rawlsian Approach

    2018 | HICSS | Citations: 0

    Authors: Bay, Morten

    Abstract: Targeted social media advertising based on psychometric user profiling has emerg ... Expand

    Semantic filters: theory of information warfare

    Topics: social media advertising management Facebook marketing management

    Methods: psychometrics survey

    Theories: big five model theory of information warfare

  • Two-stage database intrusion detection by combining multiple evidence and belief update

    PDF

    2013 | Information Systems Frontiers | Citations: 0

    Authors: Panigrahi, Suvasini; Sural, Shamik; Majumdar, Arun K.

    Abstract: Insider threats have gained prominence and pose the most challenging threats to ... Expand

    Semantic filters: theory of information warfare

    Topics: database system intrusion detection system information system use online learning system structured query language

    Methods: experiment simulation anomaly detection machine learning Markov chain Monte Carlo

    Theories: Dempster-Shafer theory theory of information warfare

  • Information control and terrorism: Tracking the Mumbai terrorist attack through twitter

    PDF

    2011 | Information Systems Frontiers | Citations: 33

    Authors: Oh, Onook; Agrawal, Manish; Rao, H. Raghav

    Abstract: This paper analyzes the role of situational information as an antecedent of terr ... Expand

    Semantic filters: theory of information warfare

    Topics: terrorist incident Twitter decision making website social media

    Methods: qualitative content analysis qualitative coding

    Theories: theory of information warfare

  • Risks and Benefits of Signaling Information System Characteristics to Strategic Attackers

    PDF

    2009 | Journal of Management Information Systems | Citations: 17

    Authors: Cremonini, Marco; Nizovtsev, Dmitri

    Abstract: The paper uses a game-theoretic setting to examine the interaction between strat ... Expand

    Semantic filters: theory of information warfare

    Topics: data security economic surplus IS economics cost benefit analysis data breach

    Methods: simulation experiment archival research

    Theories: game theory theory of information warfare

  • Cyber-Warfare Threatens Corporations: Expansion into Commercial Environments

    PDF

    2006 | Information Systems Management | Citations: 0

    Authors: Knapp, Kenneth J.; Boulton, William R.

    Abstract: On the basis of a review of information warfare literature from 1990 to mid-2005 ... Expand

    Semantic filters: theory of information warfare

    Topics: armed conflict IT security threat ubiquitous computing cyberwarfare digital economy

    Methods: literature study survey

    Theories: theory of information warfare

  • A Longitudinal Study of Information System Threat Categories: The Enduring Problem of Human Error

    PDF

    2005 | ACM SIGMIS Database | Citations: 0

    Authors: Im, Ghi Paul; Baskerville, Richard L.

    Abstract: Taxonomies of information security threats usually distinguish between accidenta ... Expand

    Semantic filters: theory of information warfare

    Topics: IT security IT risk management terrorist incident system reliability systems development

    Methods: descriptive statistic survey literature study

    Theories: theory of information warfare

  • Agile Security for Information Warfare: A Call for Research

    2004 | European Conference On Information Systems | Citations: 1

    Authors: Baskerville, Richard

    Abstract: The context of information security is changing dramatically. Networking technol ... Expand

    Semantic filters: theory of information warfare

    Topics: data security IT security threat agile software development systems development

    Methods: theory development

    Theories: theory of information warfare

  • The Influence of Task Load and Automation Trust on Deception Detection

    PDF

    2004 | Group Decision and Negotiation | Citations: 0

    Authors: Biros, David P.; Daly, Mark; Gunsch, Gregg

    Abstract: The purpose of this research was to investigate the effects that user task load ... Expand

    Semantic filters: theory of information warfare

    Topics: information system use decision making deception detection decision support system human computer interaction

    Methods: experimental group survey experiment descriptive statistic simulation

    Theories: theory of information warfare