Semantic Filter
show all semantic filters
Found 57399 articles
  • Introduction to Policies and Strategies for Digital Government

    2023 | HICSS | Citations: 0

    Authors: Cordella, A.; Gualdi, F.; Bannister, F.; Park, K.

    Abstract: ... Expand

    Topics: value creation information system use government system open innovation perceived ease of use

    Methods: design methodology

  • Credibility of Virtual Influencers: The Role of Design Stimuli, Knowledge Cues, and User Disposition

    2023 | HICSS | Citations: 0

    Authors: Cornelius, Samia; Leidner, Dorothy; Benbya, Hind

    Abstract: Virtual Influencers (VIs) are digital influencers that can look and behave like ... Expand

    Topics: robotic social media Instagram social network digital platform

    Methods: experiment laboratory experiment experimental design mediation analysis repeated measures ANOVA

  • Significance of Visual Realism – Eeriness, Credibility, and Persuasiveness of Virtual Influencers

    2023 | HICSS | Citations: 0

    Authors: Cornelius, Samia; Leidner, Dorothy; Bina, Saman

    Abstract: Though human-like design can increase favorable social behaviors like familiarit ... Expand

    Topics: Instagram social media digital media logistics management word of mouth

    Methods: experiment Wald test parametric test logistic regression binomial logistic regression

    Theories: uncanny valley theory

  • Using machine learning to create and capture value in the business models of small and medium-sized enterprises

    PDF

    2023 | International Journal of Information Management | Citations: 0

    Authors: Costa-Climent, Ricardo; Haftor, Darek M.; Staniewski, Marcin W.

    Abstract: Start-ups have revolutionised many economic ecosystems, becoming innovation pion ... Expand

    Topics: value creation Twitter social media database system website

    Methods: descriptive statistic theory development regression analysis method general multivariate regression model linear regression analysis

  • Appreciating the Performance of Neuroscience Mining in NeuroIS Research: A Case Study on Consumer's Product Perceptions in the Two UI Modes-Dark UI vs. Light UI

    2023 | HICSS | Citations: 0

    Authors: Costello, F.; Kim, M.; Lee, K.

    Abstract: The goal of the current study was to explore the potential of neuroscience mini ... Expand

    Topics: user interface big data usability tablet artificial intelligence

    Methods: electroencephalography NeuroIS computational algorithm sensitivity analysis machine learning

  • Unexpected Events in IT Projects: A Conceptual Review and Research Agenda

    PDF

    2023 | Communications of the Association for Information Systems | Citations: 0

    Authors: Coulon, Thibaut; Paré, Guy; Barki, Henri

    Abstract: When unexpected events occur, IT project teams need to react appropriately in o ... Expand

    Topics: IT project project management IT project team database system sensemaking

    Methods: literature sample literature study synthesis literature filtering

  • Barking Up the Wrong Tree? Reconsidering Policy Compliance as a Dependent Variable within Behavioral Cybersecurity Research

    2023 | HICSS | Citations: 0

    Authors: Cram, W. Alec; D'Arcy, John

    Abstract: A rich body of research examines the cybersecurity behavior of employees, with a ... Expand

    Topics: IT security data breach computer data storage cybersecurity behavior top management support

    Methods: survey linguistic analysis company material

  • ‘What a waste of time’: An examination of cybersecurity legitimacy

    PDF

    2023 | Information Systems Journal | Citations: 0

    Authors: Cram, W. Alec; D'Arcy, John

    Abstract: Managers who oversee cybersecurity policies commonly rely on managerial encourag ... Expand

    Topics: IT security top management support cybersecurity behavior pandemic privacy

    Methods: survey SEM tool structural equation modeling survey design confirmatory factor analysis

    Theories: fairness theory organizational behavior theory

  • Accounting for Uncertainty in Deceptive Signaling for Cybersecurity

    2023 | HICSS | Citations: 0

    Authors: Cranford, E.; Ou, H.; Gonzalez, C.; Tambe, M.; Lebiere, C.

    Abstract: Deceptive signaling has proven an effective method that can aid security analys ... Expand

    Topics: IT security decision making accounting physical security

    Methods: computational algorithm experiment simulation machine learning survey

  • Extending the Cyber Capabilities of Small to Midsize Businesses

    2023 | HICSS | Citations: 0

    Authors: Croasdell, Dave; Lathrop, Logan; Elste, James

    Abstract: This project explores disparities in the cybersecurity practices of small to mid ... Expand

    Topics: IT security IT security threat business continuity planning

    Methods: survey