2023 | European Journal of Information Systems | Citations: 0
Authors: Ngwenyama, Ojelanki; Henriksen, Helle Zinner; Hardt, Daniel
Abstract: The rise of the digital society is accompanied by incalculable social risks, but ... Expand
Semantic filters: theory of information warfare
Topics: IT risk management data breach identity theft denial of service attack internet technology
Methods: theory development case study qualitative content analysis cluster analysis design artifact
Theories: theory of information warfare theory of communicative action
2019 | HICSS | Citations: 2
Authors: Etudo, Ugochukwu; Yoon, Victoria; Yaraghi, Niam
Abstract: Online trolling is typically studied in the IS literature as an uncoordinated, a ... Expand
Semantic filters: theory of information warfare
Topics: Facebook application programming interface missing data internet technology Python
Methods: topic model time series analysis longitudinal research term frequency–inverse document frequency data transformation
Theories: theory of information warfare
2018 | HICSS | Citations: 0
Authors: Bay, Morten
Abstract: Targeted social media advertising based on psychometric user profiling has emerg ... Expand
Semantic filters: theory of information warfare
Topics: social media advertising management Facebook marketing management
Methods: psychometrics survey
Theories: big five model theory of information warfare
2013 | Information Systems Frontiers | Citations: 0
Authors: Panigrahi, Suvasini; Sural, Shamik; Majumdar, Arun K.
Abstract: Insider threats have gained prominence and pose the most challenging threats to ... Expand
Semantic filters: theory of information warfare
Topics: database system intrusion detection system information system use online learning system structured query language
Methods: experiment simulation anomaly detection machine learning Markov chain Monte Carlo
Theories: Dempster-Shafer theory theory of information warfare
2011 | Information Systems Frontiers | Citations: 33
Authors: Oh, Onook; Agrawal, Manish; Rao, H. Raghav
Abstract: This paper analyzes the role of situational information as an antecedent of terr ... Expand
Semantic filters: theory of information warfare
Topics: terrorist incident Twitter decision making website social media
Methods: qualitative content analysis qualitative coding
Theories: theory of information warfare
2009 | Journal of Management Information Systems | Citations: 17
Authors: Cremonini, Marco; Nizovtsev, Dmitri
Abstract: The paper uses a game-theoretic setting to examine the interaction between strat ... Expand
Semantic filters: theory of information warfare
Topics: data security economic surplus IS economics cost benefit analysis data breach
Methods: simulation experiment archival research
Theories: game theory theory of information warfare
2006 | Information Systems Management | Citations: 0
Authors: Knapp, Kenneth J.; Boulton, William R.
Abstract: On the basis of a review of information warfare literature from 1990 to mid-2005 ... Expand
Semantic filters: theory of information warfare
Topics: armed conflict IT security threat ubiquitous computing cyberwarfare digital economy
Methods: literature study survey
Theories: theory of information warfare
2005 | ACM SIGMIS Database | Citations: 0
Authors: Im, Ghi Paul; Baskerville, Richard L.
Abstract: Taxonomies of information security threats usually distinguish between accidenta ... Expand
Semantic filters: theory of information warfare
Topics: IT security IT risk management terrorist incident system reliability systems development
Methods: descriptive statistic survey literature study
Theories: theory of information warfare
2004 | European Conference On Information Systems | Citations: 1
Authors: Baskerville, Richard
Abstract: The context of information security is changing dramatically. Networking technol ... Expand
Semantic filters: theory of information warfare
Topics: data security IT security threat agile software development systems development
Methods: theory development
Theories: theory of information warfare
2004 | Group Decision and Negotiation | Citations: 0
Authors: Biros, David P.; Daly, Mark; Gunsch, Gregg
Abstract: The purpose of this research was to investigate the effects that user task load ... Expand
Semantic filters: theory of information warfare
Topics: information system use decision making deception detection decision support system human computer interaction
Methods: experimental group survey experiment descriptive statistic simulation
Theories: theory of information warfare